John, an employee of an organization, always connects to the corporate network using his own mobile device. Which of the following best practices prevents BYOD risk when John connects to the corporate network?

A. Improperly disposing of a device
B. Not reporting a lost or stolen device
C. Providing support for many different devices
D. Separating personal and private data

Answer: D. Separating personal and private data

Computer Science & Information Technology

You might also like to view...

Junk e-mail is also known as:

A) SMTP B) IMAP C) UCE D) POP3

Computer Science & Information Technology

Some common lightweight component features supported by JComponent include:

a. support for user-interface localization. b. shortcut keys. c. tool tips. d. All of the above.

Computer Science & Information Technology