Which two options are business-use trends that have surfaced in the last five years,
prompting a need for nontraditional security methods? (Choose two.)
A.
Substantial number of remote employees
B.
Third-party applications
C.
Partial URL and application blocking
D.
BYOD
E.
Wi-Fi connections
F.
Web and email attacks