Which of the following is the best example of a compliance risk that is likely to arise when adopting a bring-your-own-device (BYOD) policy?

Posted by: Pdfprep Category: IIA-CIA-Part3 Tags: , ,

Which of the following is the best example of a compliance risk that is likely to arise when adopting a bring-your-own-device (BYOD) policy?
A . The risk that users try to bypass controls and do not install required software updates.
B . The risk that smart devices can be lost or stolen due to their mobile nature.
C . The risk that an organization intrusively monitors personal information stored on smart devices.
D . The risk that proprietary information is not deleted from the device when an employee leaves.

Answer: C

Leave a Reply

Your email address will not be published.