A company has a security policy that specifies all endpoint computing devices should be assigned a unique identifier that can be tracked via an inventory management system. Recent changes to airline security regulations have cause many executives in the company to travel with mini tablet devices instead of laptops. These tablet devices are difficult to tag and track. An RDP application is used from the tablet to connect into the company network.Which of the following should be implemented in order to meet the security policy requirements?

A. Virtual desktop infrastructure (IDI)
B. WS-security and geo-fencing
C. A hardware security module (HSM)
D. RFID tagging system
E. MDM software
F. Security Requirements Traceability Matrix (SRTM)

Ans: E. MDM software

Computer Science & Information Technology

You might also like to view...

You can sort data in a table

Indicate whether the statement is true or false

Computer Science & Information Technology

The Excel template extension is .xltmp

Indicate whether the statement is true or false

Computer Science & Information Technology