Notifications
Clear all
Topic starter
15/08/2022 10:13 am
An information security manager is implementing a bring your own device (BYOD) program.
Which of the following would BEST ensure that users adhere to the security standards?
- A . Establish an acceptable use policy.
- B . Monitor user activities on the network.
- C . Publish the standards on the intranet landing page.
- D . Deploy a device management solution.
Suggested Answer: A