Which two risks exist in the access layer of the CGE environment? (Choose two.)
A. Secure Gateway is used by some sites.
B. Single-factor authentication is in use for external end users.
C. Receiver for mobile devices is installed from third-party stores.
D. End-user connections from non-corporate-owned devices are allowed.