[TABS_R id=9422]
A company is implementing a work-from-home policy. As a result, the security team needs to provide guidelines and recommendations to secure such an infrastructure and have more control over users’ mobile devices. Which of the following should the security administrator recommend? (Choose two.)
- Change management policy
- EULA
- BYOD policy
- Business continuity plan
- MDM policy
- Time-based login policies
[TABS_R id=9422]