An organization has adopted a bring-your-own-device (BYOD) policy, and employees can access organizational data via their smart devices. Which of the following authentication policy requirements is the most advisable?
An organization has adopted a bring-your-own-device (BYOD) policy, and employees can access organizational data via their smart devices. Which of the following authentication policy requirements is the most advisable?
Answer should be D, C is a security measures but not authentication mechanisms.
Authentication controls are something you have, something you know, something you are. So only B and D relate. The others are security controls. 2 Factor authentication is more secure than single such as password / swipe pattern therefore answer must be D.