Register
2:00
Stop
CompTIA Security+ - Securing Wireless and Mobile Devices - Bring Your Own Device (BYOD) Security
Master
1/2
A company is implementing a BYOD policy and wants to ensure the secure sharing of sensitive files between company-approved applications on personal devices. Which of the following techniques is the BEST to achieve this?
a.
Two-factor authentication (2FA)
b.
Data at rest encryption
c.
Data Loss Prevention (DLP)
d.
User awareness training
Master