• Post author:
  • Post category:Updated
  • Reading time:2 mins read
  • Post last modified:June 12, 2024

What three goals does a BYOD security policy accomplish? (Choose three.)

  • identify safeguards to put in place if a device is compromised
  • describe the rights to access and activities permitted to security personnel on the device
  • identify a list of websites that users are not permitted to access
  • identify and prevent all heuristic virus signatures
  • identify which employees can bring their own devices
  • identify all malware signatures and synchronize them across corporate databases
Answers Explanation & Hints:

A comprehensive BYOD policy should accomplish the following:
Identification of which employees can bring their own devices
Identification of which devices will be supported
Identification of the level of access employees are granted when using personal devices
Describe the rights to access and activities permitted to security personnel on the device
Identification of which regulations must be adhered to when using employee devices
Identification of safeguards to put in place if a device is compromised

For more Questions and Answers:

CyberOps Associate 1.02 & CA v1.0 Modules 18 – 20: Network Defense Group Exam Answers Full 100%

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments