Which of the following is MOST important for an IS auditor to verify when reviewing an organization’s information security practices following the adoption of a bring your own device (BYOD) program?

Posted by: Pdfprep Category: CISA Tags: , ,

Which of the following is MOST important for an IS auditor to verify when reviewing an organization’s information security practices following the adoption of a bring your own device (BYOD) program?
A . Only applications approved by information security may be installed on devices.
B . The expected benefits of adopting the BYOD program have been realized.
C . Security policies have been updated to include BYO
E . Remote wipe is enabled for devices allowed by BYO

Answer: C

Leave a Reply

Your email address will not be published.