An administrator is trying to develop a BYOD security policy for employees that are bringing a wide range of devices to connect to the company network. Which three objectives must the BYOD security policy address? (Choose three.)
- All devices must have open authentication with the corporate network.
- The level of access of employees when connecting to the corporate network must be defined.
- Rights and activities permitted on the corporate network must be defined.
- All devices should be allowed to attach to the corporate network flawlessly.
- Safeguards must be put in place for any personal device being compromised.
- All devices must be insured against liability if used to compromise the corporate network.
Explanation & Hint:
When developing a Bring Your Own Device (BYOD) security policy, the primary objectives are to ensure the security of the corporate network while allowing employees the flexibility to use their personal devices. Here are three objectives that such a policy must address:
The other options listed are not typical or recommended objectives of a BYOD security policy:
|