In the event of a mobile device being lost or stolen, which of the following BEST protects against sensitive information leakage?

A. Cable locks
B. Remote wipe
C. Screen lock
D. Voice encryption


Answer: B. Remote wipe

Computer Science & Information Technology

You might also like to view...

The purpose of the ____ element is to identify content that is inline without affecting the position by adding white space above and below.

A. level B. span C. inline D. block

Computer Science & Information Technology

According to netiquette rules, it is acceptable to send a flame if you have a close relationship with the person receiving the email

Indicate whether the statement is true or false

Computer Science & Information Technology

In Objective-C methods, arguments are separated with which punctuation mark?

A. colons (:) B. commas (,) C. semicolons (;) D. pipes (|)

Computer Science & Information Technology

How do you move to the previous cell in a row?

A) Shift+Tab B) Alt+F1 C) Ctrl+Tab D) Alt+Tab

Computer Science & Information Technology