Your organization is concerned about the bring your own device (BYOD) trend. You need to ensure that any BYOD devices that are deployed on the enterprise have the appropriate security controls in place. Which of the following should you do to provide this?
A. Change all the user passwords for BYOD users.
B. Set up a separate account to be used by BYOD users.
C. Implement NAC rules.
D. Deploy a router that isolates the BYOD devices on their own subnet.
C
Explanation: You should implement Network Access Control (NAC) rules to ensure that your organization is protected when this technology is deployed. These rules will ensure that certain security settings and tools, such as antivirus software, are deployed on the personal devices.
Computer Science & Information Technology
You might also like to view...
Zoom is set in the ________ tab
A) Page Layout B) View C) Home D) Review
Computer Science & Information Technology
Which type of slide is NOT a good choice for a kiosk presentation?
A) A slide with animation B) A summary slide C) A slide asking for comments from the viewer D) A welcome slide
Computer Science & Information Technology