× Didn't find what you were looking for? Ask a question
Top Posters
Since Sunday
d
4
N
3
3
R
3
k
3
o
3
Z
3
j
3
s
3
d
3
J
3
1
3
New Topic  
jeddsn jeddsn
wrote...
Posts: 708
Rep: 0 0
6 years ago
Which of the following could be an appropriate security step for businesses implementing a BYOD policy for employees?
 a. limit access to e-mail only
 b. password and timeout protection
 c. limit the type of apps that can be downloaded
  d. All of the above
Read 26 times
2 Replies
Replies
Answer verified by a subject expert
ltauzzyltauzzy
wrote...
Top Poster
Posts: 1003
Rep: 2 0
6 years ago
Sign in or Sign up in seconds to unlock everything for free
1

Related Topics

jeddsn Author
wrote...
6 years ago
Just confirmed the same answer from my friend, thanks
New Topic      
Explore
Post your homework questions and get free online help from our incredible volunteers
  1436 People Browsing
Related Images
  
 299
  
 371
  
 296
Your Opinion
Where do you get your textbooks?
Votes: 447