An administrator is trying to develop a BYOD security policy for employees that are bringing a wide range of devices to connect to the company network. Which three objectives must the BYOD security policy address? (Choose three.)

An administrator is trying to develop a BYOD security policy for employees that are bringing a wide range of devices to connect to the company network. Which three objectives must the BYOD security policy address? (Choose three.)

  • All devices must have open authentication with the corporate network.
  • The level of access of employees when connecting to the corporate network must be defined.
  • Rights and activities permitted on the corporate network must be defined.
  • All devices should be allowed to attach to the corporate network flawlessly.
  • Safeguards must be put in place for any personal device being compromised.
  • All devices must be insured against liability if used to compromise the corporate network.

Leave a comment