
Ultimate access to all questions.
Consider a scenario where you are required to specify security requirements for a mobile workforce using a mix of company-owned and personally-owned devices. Detail the comprehensive strategy you would adopt to ensure endpoint protection, hardening, and configuration management, considering the diversity of devices and potential threats.
A
Implement a strict policy banning personally-owned devices.
B
Use a mobile device management (MDM) solution to enforce security policies across all devices.
C
Rely on users to self-manage their device security.
D
Only allow the use of high-end devices to ensure security.