Which of the following is MOST important to consider when developing a bring your own device (BYOD) policy?

Posted by: Pdfprep Category: CISA Tags: , ,

Which of the following is MOST important to consider when developing a bring your own device (BYOD) policy?
A . Supported operating systems
B . Procedure for accessing the network
C . Application download restrictions
D . Remote wipe procedures

Answer: B

Leave a Reply

Your email address will not be published.