Your organization is concerned about the bring your own device (BYOD) trend. You need to ensure that any BYOD devices that are deployed on the enterprise have the appropriate security controls in place. Which of the following should you do to provide this?

A. Change all the user passwords for BYOD users.
B. Set up a separate account to be used by BYOD users.
C. Implement NAC rules.
D. Deploy a router that isolates the BYOD devices on their own subnet.


C

Explanation: You should implement Network Access Control (NAC) rules to ensure that your organization is protected when this technology is deployed. These rules will ensure that certain security settings and tools, such as antivirus software, are deployed on the personal devices.

Computer Science & Information Technology

You might also like to view...

The ________ file contains any changes made to the software not disclosed in the user manual

Fill in the blank(s) with correct word

Computer Science & Information Technology

Match the following acronyms with their description:

I. VBA II. DBMS III. ACCDE IV. RAM V. SQL A. Where most Office programs store their files while the user is working B. Used in several database programs C. Used to create modules D. A database format that only allows data entry E. Access is one example.

Computer Science & Information Technology

A semi-colon separates multiple arguments for an action in a macro.____________________

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Changes you make to a photo do not become permanent until you _________________________ or store them on a storage device.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology