1.3k views
5 votes
Fred has been assigned to review his organization's host security policies due to a recent theft of a workstation that contained sensitive data. Which of the following controls would best help to prevent a stolen machine from causing a data breach?

A. Central management
B. FDE
C. Remote wipe capabilities
D. Machine tracking software

1 Answer

1 vote

Final answer:

The best control to prevent a data breach from a stolen machine is Remote wipe capabilities, as it allows data to be remotely deleted, safeguarding sensitive information.

Step-by-step explanation:

Fred has been tasked with reviewing his organization's host security policies due to a recent theft of a workstation with sensitive data. The control that would best help to prevent a data breach in case of a stolen machine would be Remote wipe capabilities. This feature allows an organization to remotely delete data on a stolen device, thus protecting sensitive information from unauthorized access. While Central management can assist with overall security policy enforcement and Machine tracking software might help recover the stolen device, they do not directly prevent data from being accessed. Full Disk Encryption (FDE) would protect data only if the theft does not have the credentials to unlock the workstation; however, Remote wipe provides an additional layer of security by ensuring that the data can be deleted should the machine fall into the wrong hands.

User HackToHell
by
7.6k points