Notifications
Clear all
Topic starter
09/11/2022 3:48 pm
When considering whether to adopt bring your own device (BYOD). it is MOST important for the information security manager to ensure that
- A . security controls are applied to each device when joining the network.
- B . the applications are tested prior to implementation
- C . users have read and signed acceptable use agreements.
- D . business leaders have an understanding of security risks
Suggested Answer: A