Which of the following is a risk of implementing a BYOD policy?
A . Introducing malware onto the network
B . DHCP may fail due to incompatibility
C . Different encryption technology
D . Higher risk of phishing attacks
Answer: A
Which of the following is a risk of implementing a BYOD policy?
A . Introducing malware onto the network
B . DHCP may fail due to incompatibility
C . Different encryption technology
D . Higher risk of phishing attacks
Answer: A