Which of the following policies best addresses the increased risk to the organization’s network incurred by this environment?

Posted by: Pdfprep Category: IIA-CIA-Part3 Tags: , ,

An organization has instituted a bring-your-own-device (BYOD) work environment.

Which of the following policies best addresses the increased risk to the organization’s network incurred by this environment?
A . Limit the use of the employee devices for personal use to mitigate the risk of exposure to organizational data.
B . Ensure that relevant access to key applications is strictly controlled through an approval and review process
C . Institute detection and authentication controls for all devices used for network connectivity and data storage
D . Use management software to scan and then prompt patch reminders when devices connect to the network

Answer: D

Leave a Reply

Your email address will not be published.