Which security policy will be most likely used while attempting to mitigate the risks involved with allowing a user to access company email via their cell phone?

Which security policy will be most likely used while attempting to mitigate the risks involved with
allowing a user to access company email via their cell phone?

Which security policy will be most likely used while attempting to mitigate the risks involved with
allowing a user to access company email via their cell phone?

A.
The cell phone should require a password after a set period of inactivity.

B.
The cell phone should have data connection abilities disabled.

C.
The cell phone should only be used for company related emails.

D.
The cell phone data should be encrypted according to NIST standards.



Leave a Reply 0

Your email address will not be published. Required fields are marked *