
Ultimate access to all questions.
Your company is transitioning to a bring-your-own-device (BYOD) policy to enhance employee flexibility and productivity. However, the IT security team is concerned about the potential risks to the company's sensitive data. The company operates in a highly regulated industry, requiring strict compliance with data protection standards. Additionally, the solution must be cost-effective and scalable to accommodate future growth. Considering these constraints, which of the following security measures would BEST address the company's concerns while supporting the BYOD policy? (Choose one option.)
A
Implement a comprehensive endpoint protection solution on all company-owned devices only, assuming personal devices will not access sensitive data.
B
Specify and enforce security requirements for personal devices, including mandatory device registration, multi-factor authentication, data encryption, and regular security audits to ensure compliance with industry standards.
C
Restrict access to company resources from personal devices entirely, requiring employees to use company-provided devices for all work-related activities.
D
Allow unrestricted access to company resources from personal devices, relying on employees' discretion to secure their devices and data.