A cybersecurity analyst is reviewing the current BYOD security posture. The users must be able to synchronize their calendars, email, and contacts to a smartphone or other personal device. The recommendation must provide the most flexibility to users.
Which of the following recommendations would meet both the mobile data protection efforts and the business requirements described in this scenario?
A . Develop a minimum security baseline while restricting the type of data that can be accessed.
B . Implement a single computer configured with USB access and monitored by sensors.
C . Deploy a kiosk for synchronizing while using an access list of approved users.
D . Implement a wireless network configured for mobile device access and monitored by sensors.
Answer: D
Leave a Reply