148k views
2 votes
An engineer maintains a corporate-owned mobility infrastructure, and the organization requires that all web browsing using corporate-owned resources be monitored.

Which of the following would allow the organization to meet its requirement? (Choose two.)

A. Exempt mobile devices from the requirement, as this will lead to privacy violations
B. Configure the devices to use an always-on IPSec VPN
C. Configure all management traffic to be tunneled into the enterprise via TLS
D. Implement a VDI solution and deploy supporting client apps to devices
E. Restrict application permissions to establish only HTTPS connections outside of the enterprise boundary

User Ivo P
by
7.8k points

1 Answer

7 votes

Final answer:

To monitor all web browsing using corporate-owned resources, configuring the devices to use an always-on IPsec VPN and implementing a VDI solution with client apps for devices are viable options. These methods ensure secure monitoring and data security of web activities on mobile devices owned by the corporation.

Step-by-step explanation:

To meet the requirement of monitoring all web browsing using corporate-owned resources, an engineer can implement several solutions. Among the given options, configuring devices to use an always-on IPsec VPN (B) and implementing a VDI (Virtual Desktop Infrastructure) solution with supporting client apps deployed to devices (D) would allow for the necessary oversight. Option B, utilizing an IPsec VPN, ensures that all traffic from the mobile device is securely tunneled to the organization's infrastructure, where monitoring can occur. Furthermore, option D's use of VDI means all activity happens within a controlled environment where the organization can monitor actions easily, while also maintaining a higher level of data security since data and applications reside on the corporate servers instead of the mobile device.

Options A and E do not address the monitoring requirements and are therefore not suitable solutions. Option A is about exemption, which is contrary to the organization's requirements, and option E only speaks to restricting application permissions for HTTPS connections, not monitoring all web browsing traffic. Option C, while security-oriented, pertains to management traffic and not all web browsing activity.

User Adam Kosiorek
by
8.1k points