To protect data on user devices in a BYOD environment, the organization should consider requiring all the following, except:
A. Multifactor authentication
B. DLP agents
C. Two-person integrity
D. Local encryption
A. Multifactor authentication
B. DLP agents
C. Two-person integrity
D. Local encryption