A company is implementing a work-from-home policy.
As a result, the security team needs to provide guidelines and recommendations to secure such an infrastructure and have more control over users' mobile devices.
Which of the following should the security administrator recommend? (Choose two.)
Click on the arrows to vote for the correct answer
A. B. C. D. E. F.CE.
To secure an infrastructure and have more control over users' mobile devices, the security administrator should recommend the following:
BYOD Policy: A Bring Your Own Device (BYOD) policy should be recommended to ensure that employees are aware of the security policies and protocols to be followed when accessing company resources with their personal devices. This policy should specify the types of devices and operating systems that are allowed, and security measures that must be implemented on the devices, such as antivirus software, firewalls, and encryption.
Mobile Device Management (MDM) Policy: An MDM policy should also be recommended to provide more control over mobile devices. This policy should outline the procedures and tools that will be used to manage and secure the mobile devices, such as device enrollment, remote wiping of data, and app installation control. An MDM solution should be selected and configured to ensure that all devices are secure and compliant with company policies.
The other options provided in the question are not as relevant to the scenario described: