Which of the following would be an information security manager’s PRIMARY challenge when deploying a bring your own device (BYOD) mobile program in an enterprise?
A. End user acceptance
B. Mobile application control
C. Configuration management
D. Disparate device security
A. End user acceptance
B. Mobile application control
C. Configuration management
D. Disparate device security