单选题Which of the following security policies is BEST to use when trying to mitigate the risks involved with allowing a user to access company email via their cell phone?()A The cell phone should require a password after a set period of inactivity.B The cel

题目
单选题
Which of the following security policies is BEST to use when trying to mitigate the risks involved with allowing a user to access company email via their cell phone?()
A

The cell phone should require a password after a set period of inactivity.

B

The cell phone should only be used for company related emails.

C

The cell phone data should be encrypted according to NIST standards.

D

The cell phone should have data connection abilities disabled.

更多“单选题Which of the following security policies is BEST to use when trying to mitigate the risks involved with allowing a user to access company email via their cell phone?()A The cell phone should require a password after a set period of inactivity.B The cel”相关问题