Multiple Choice
An organization has instituted a bring-your-own-device (BYOD) work environment. Which of the following policies best addresses the increased risk to the organization's network incurred by this environment?
A) Limit the use of the employee devices for personal use to mitigate the risk of exposure to organizational data.
B) Ensure that relevant access to key applications is strictly controlled through an approval and review process.
C) Institute detection and authentication controls for all devices used for network connectivity and data storage.
D) Use management software to scan and then prompt patch reminders when devices connect to the network.
Correct Answer:

Verified
Correct Answer:
Verified
Q232: According to IIA guidance on IT, which
Q233: Which of the following actions is most
Q234: Which audit approach should be employed to
Q235: Which type of bond sells at a
Q236: An organization is projecting sales of 100,000
Q238: A retail organization mistakenly did not include
Q239: According to IIA guidance on IT auditing,
Q240: Which of the following COSO internal control
Q241: According to the ISO 14001 standard, which
Q242: Technological uncertainty, subsidy, and spin-offs are usually