Which of the following is a risk of implementing a BYOD policy?
A. Introducing malware onto the n
etwork
B. DHCP may fail due to incompatibility
C. Different encryption technology
D. Higher risk of phishing attacks
Which of the following is a risk of implementing a BYOD policy?
A. Introducing malware onto the n
etwork
B. DHCP may fail due to incompatibility
C. Different encryption technology
D. Higher risk of phishing attacks