John, an employee of an organization, always connects to the corporate network using his own mobile device. Which of the following best practices prevents BYOD risk when John connects to the corporate network?
A. Improperly disposing of a device
B. Not reporting a lost or stolen device
C. Providing support for many different devices
D. Separating personal and private data
Answer: D. Separating personal and private data
Computer Science & Information Technology
You might also like to view...
Junk e-mail is also known as:
A) SMTP B) IMAP C) UCE D) POP3
Computer Science & Information Technology
Some common lightweight component features supported by JComponent include:
a. support for user-interface localization. b. shortcut keys. c. tool tips. d. All of the above.
Computer Science & Information Technology