Posted by: Pdfprep
Post Date: October 27, 2020
Which of the following is MOST important for an IS auditor to verify when reviewing an organization’s information security practices following the adoption of a bring your own device (BYOD) program?
A . Only applications approved by information security may be installed on devices.
B . The expected benefits of adopting the BYOD program have been realized.
C . Security policies have been updated to include BYO
E . Remote wipe is enabled for devices allowed by BYO
Answer: C
Leave a Reply