For an enterprise implementing a bring your own device (BYOD) program, which of the following would provide the BEST security of corporate data residing on unsecured mobile devices?

Posted by: Pdfprep Category: CISM Tags: , ,

For an enterprise implementing a bring your own device (BYOD) program, which of the following would provide the BEST security of corporate data residing on unsecured mobile devices?
A . Acceptable use policy
B . Device certification process
C . Containerization solution
D . Data loss prevention (DLP)

Answer: D

Leave a Reply

Your email address will not be published.