A company provides mobile devices to its users to permit access to email and enterprise applications. The company recently started allowing users to select from several different vendors and device models.
When configuring the MDM, which of the following is a key security implication of this heterogeneous device approach?
A . The most common set of MDM configurations will become the effective set of enterprise mobile security controls.
B . All devices will need to support SCEP-based enrollment; therefore, the heterogeneity of the chosen architecture may unnecessarily expose private keys to adversaries.
C . Certain devices are inherently less secure than others, so compensatory controls will be needed to address the delta between device vendors.
D . MDMs typically will not support heterogeneous deployment environments, so multiple MDMs will need to be installed and configured.
Answer: C