An organization has instituted a bring-your-own-device (BYOD) work environment. Which of the
following policies best addresses the increased risk to the organiza*on's network incurred by this
environment?
A. Limit the use of the employee devices for personal use to mitigate the risk of exposure to
organizational data.
B. Ensure that relevant access to key applications is strictly controlled through an approval and
review process.
C. Institute detection and authentication controls for all devices used for network connectivity and
data storage.
D. Use management software scan and then prompt parch reminders when devices connect to the
network