CISA Certified Information Systems Auditor – Question0846

When considering whether to adopt bring your own device (BYOD), it is MOST important for the information security manager to ensure that:

A.
security controls are applied to each device when joining the network
B. business leaders have an understanding of security risks
C. users have read and signed acceptable use agreements
D. the applications are tested prior to implementation

Correct Answer: A