Which of the following is a risk of implementing a BYOD policy?
A.
Introducing malware onto the network
B.
DHCP may fail due to incompatibility
C.
Different encryption technology
D.
Higher risk of phishing attacks
Which of the following is a risk of implementing a BYOD policy?
Which of the following is a risk of implementing a BYOD policy?
A.
Introducing malware onto the network
B.
DHCP may fail due to incompatibility
C.
Different encryption technology
D.
Higher risk of phishing attacks