IIA-CIA-Part3 Exam QuestionsBrowse all questions from this exam

IIA-CIA-Part3 Exam - Question 314


An organization has adopted a bring-your-own-device (BYOD) policy, and employees can access organizational data via their smart devices. Which of the following authentication policy requirements is the most advisable?

Show Answer
Correct Answer:

Discussion

2 comments
Sign in to comment
emtofidOption: D
Mar 13, 2025

Answer should be D, C is a security measures but not authentication mechanisms.

137a7a9Option: D
Apr 7, 2025

Authentication controls are something you have, something you know, something you are. So only B and D relate. The others are security controls. 2 Factor authentication is more secure than single such as password / swipe pattern therefore answer must be D.