Which of the following would be an information security manager’s PRIMARY challenge when deploying a Bring Your Own Device (BYOD) mobile program in an enterprise?
A. End user acceptance
B. Configuration management
C. Mobile application control
D. Disparate device security
A. End user acceptance
B. Configuration management
C. Mobile application control
D. Disparate device security