Implementing Work-from-Home Policy: Guidelines for Securing Infrastructure and Mobile Devices

Securing Infrastructure and Mobile Devices for Work-from-Home Policy

Question

A company is implementing a work-from-home policy.

As a result, the security team needs to provide guidelines and recommendations to secure such an infrastructure and have more control over users' mobile devices.

Which of the following should the security administrator recommend? (Choose two.)

Answers

Explanations

Click on the arrows to vote for the correct answer

A. B. C. D. E. F.

CE.

To secure an infrastructure and have more control over users' mobile devices, the security administrator should recommend the following:

  1. BYOD Policy: A Bring Your Own Device (BYOD) policy should be recommended to ensure that employees are aware of the security policies and protocols to be followed when accessing company resources with their personal devices. This policy should specify the types of devices and operating systems that are allowed, and security measures that must be implemented on the devices, such as antivirus software, firewalls, and encryption.

  2. Mobile Device Management (MDM) Policy: An MDM policy should also be recommended to provide more control over mobile devices. This policy should outline the procedures and tools that will be used to manage and secure the mobile devices, such as device enrollment, remote wiping of data, and app installation control. An MDM solution should be selected and configured to ensure that all devices are secure and compliant with company policies.

The other options provided in the question are not as relevant to the scenario described:

  • Change management policy: This is more focused on managing changes to IT systems and processes within the company.
  • EULA: End User License Agreement (EULA) is a legal contract between a software vendor and the user, and not directly relevant to securing a work-from-home infrastructure.
  • Business continuity plan: This is focused on ensuring that critical business functions can continue during and after a disaster or disruption, and not directly related to securing mobile devices.
  • Time-based login policies: This is more focused on enforcing password policies and authentication mechanisms to prevent unauthorized access to company resources, but does not address the issue of securing mobile devices.