Which of the following is MOST important for an organization to have in place to identify unauthorized devices on the network?
A technology review and approval process
An acceptable use policy
An automated network scanning solution
A bring your own device (BYOD) policy
Automated scanning tools continuously monitor the network, detecting unauthorized devices quickly and reliably.
Submit