An organization has instituted a bring-your-own-device (BYOD) work environment. Which of the following policies best addresses the increased risk to the organization's network incurred by this environment?
A.
Limit the use of the employee devices for personal use to mitigate the risk of exposure to organizational data.
B.
Ensure that relevant access to key applications is strictly controlled through an approval and review process.
C.
Institute detection and authentication controls for all devices used for network connectivity and data storage.
D.
Use management software to scan and then prompt patch reminders when devices connect to the network.
D. Use management software to scan and then prompt patch reminders when devices connect to the network.
In a bring-your-own-device (BYOD) work environment, using management software to scan devices and prompt patch reminders when they connect to the network is a policy that addresses the increased risk to the organization's network. This approach ensures that devices connecting to the network are checked for vulnerabilities and that any necessary security patches are applied promptly, helping to reduce the potential risks associated with BYOD.
is the answer possible is C? authentication controls to prevents unauthorized access to a company network could be one of the methods to address in the BYOD environment.
upvoted 3 times
...
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
Samir_958
2 days, 19 hours agoKelime
1 year, 3 months agoCranberry
2 years, 2 months agosuperman26
3 years, 3 months ago