Exam IIA-CIA-Part3 All QuestionsBrowse all questions from this exam
Question 130

An organization has instituted a bring-your-own-device (BYOD) work environment. Which of the following policies best addresses the increased risk to the organization's network incurred by this environment?

    Correct Answer: C

    Institute detection and authentication controls for all devices used for network connectivity and data storage is the best policy to address the increased risk in a BYOD environment. This approach ensures that only authorized and secure devices can access the organization's network. It helps prevent unauthorized access and potential security threats by ensuring every device is properly authenticated and monitored.

Discussion
superman26Option: C

is the answer possible is C? authentication controls to prevents unauthorized access to a company network could be one of the methods to address in the BYOD environment.

KelimeOption: D

D. Use management software to scan and then prompt patch reminders when devices connect to the network. In a bring-your-own-device (BYOD) work environment, using management software to scan devices and prompt patch reminders when they connect to the network is a policy that addresses the increased risk to the organization's network. This approach ensures that devices connecting to the network are checked for vulnerabilities and that any necessary security patches are applied promptly, helping to reduce the potential risks associated with BYOD.

CranberryOption: C

answer is C