Which of the following controls would be most effective to mitigate security risks related to these transmissions?

Posted by: Pdfprep Category: IIA-ACCA Tags: , ,

An employee frequently uses a personal smart device to send and receive work-related emails.

Which of the following controls would be most effective to mitigate security risks related to these transmissions?
A . Hardware encryption.
B . Software encryption
C . Data encryption.
D . Authentication.

Answer: C

Leave a Reply

Your email address will not be published.