CompTIA Exam Questions

Which of the following would the security administrator…

A security administrator has been asked to assist with the identification of a BYOD design that will ensure corporate data can be managed and monitored separately
from personal data. Which of the following would the security administrator recommend?

A.
Full device encryption

B.
Application control

C.
Key management

D.
Containerization