Which of the following would be an information security manager's PRIMARY challenge when deploying a bring your own device (BYOD) mobile program in an enterprise?
A. Configuration management
B. Mobile application control
C. Inconsistent device security
D. End user acceptance