The Chief Executive Officer (CEO) of a corporation purchased the latest mobile device and wants to connect it to the internal network. The Chief Information Security Officer (CISO) was told to research and recommend how to secure this device.
Which of the following should be implemented, keeping in mind that the CEO has stated that this access is required?
A . Mitigate and Transfer
B . Accept and Transfer
C . Transfer and Avoid
D . Avoid and Mitigate
Answer: A