Which of the following is a MAIN security challenge when conducting a post-incident review related to bring your own device (BYOD) in a mature, diverse organization?
A. Ability to obtain possession of devices
B. Lack of mobile forensics expertise
C. Diversity of operating systems
D. Ability to access devices remotely
A. Ability to obtain possession of devices
B. Lack of mobile forensics expertise
C. Diversity of operating systems
D. Ability to access devices remotely