Which of the following control measures is the MOST effective against unauthorized access of confidential information on stolen or lost laptops?
Correct Answer: B
Comprehensive and Detailed Step-by-Step Explanation:
Thebest protectionfor a stolen laptop isfull disk encryption, which prevents unauthorized accesseven if the device is lost.
* Option A (Incorrect):Remote wipe capabilitiesare useful, but theyrequire an internet connectionto function, which is not always available when a device is stolen.
* Option B (Correct):Full disk encryption (FDE)ensures that data remainsunreadablewithout the correct decryption key,even if the hard drive is removed.
* Option C (Incorrect):User awarenessis helpful, but itdoes not physically securedata on a lost device.
* Option D (Incorrect):Password-protected filescan be bypassed by copying them to another system, making them an inadequate security measure.
Reference:ISACA CISA Review Manual -Domain 5: Protection of Information Assets- Covers encryption, data security, and endpoint protection.