Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

IIA Internal Audit Function IIA-CIA-Part3 Question # 79 Topic 8 Discussion

IIA Internal Audit Function IIA-CIA-Part3 Question # 79 Topic 8 Discussion

IIA-CIA-Part3 Exam Topic 8 Question 79 Discussion:
Question #: 79
Topic #: 8

An organization has instituted a bring-your-own-device (BYOD) work environment. Which of the following policies best addresses the increased risk to the organization’s network incurred by this environment?


A.

Limit the use of the employee devices for personal use to mitigate the risk of exposure to organizational data


B.

Ensure that relevant access to key applications is strictly controlled through an approval and review process


C.

Institute detection and authentication controls for all devices used for network connectivity and data storage


D.

Use management software to scan and then prompt patch reminders when devices connect to the network


Get Premium IIA-CIA-Part3 Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.