In the event of a mobile device being lost or stolen, which of the following BEST protects against sensitive information leakage?
A. Cable locks
B. Remote wipe
C. Screen lock
D. Voice encryption
Answer: B. Remote wipe
Computer Science & Information Technology
You might also like to view...
The purpose of the ____ element is to identify content that is inline without affecting the position by adding white space above and below.
A. level B. span C. inline D. block
Computer Science & Information Technology
According to netiquette rules, it is acceptable to send a flame if you have a close relationship with the person receiving the email
Indicate whether the statement is true or false
Computer Science & Information Technology
In Objective-C methods, arguments are separated with which punctuation mark?
A. colons (:) B. commas (,) C. semicolons (;) D. pipes (|)
Computer Science & Information Technology
How do you move to the previous cell in a row?
A) Shift+Tab B) Alt+F1 C) Ctrl+Tab D) Alt+Tab
Computer Science & Information Technology