What three goals does a BYOD security policy accomplish? (Choose three.)
- describe the rights to access and activities permitted to security personnel on the device
- identify and prevent all heuristic virus signatures
- identify which employees can bring their own devices
- identify all malware signatures and synchronize them across corporate databases
- identify a list of websites that users are not permitted to access
- identify safeguards to put in place if a device is compromised
Explanation: A comprehensive BYOD policy should accomplish the following:
Identification of which employees can bring their own devices
Identification of which devices will be supported
Identification of the level of access employees are granted when using personal devices
Describe the rights to access and activities permitted to security personnel on the device
Identification of which regulations must be adhered to when using employee devices
Identification of safeguards to put in place if a device is compromised
Exam with this question: Checkpoint Exam: Network Defense Group Exam
Exam with this question: Network Defense - 1.4.2 Module 1: Understanding Defense Quiz
Please login or Register to submit your answer