A new hire wants to use a personally owned phone to access company resources. The new hire expresses concern about what happens to the data on the phone when they leave the company.Which of the following portions of the company's mobile device management configuration would allow the company data to be removed from the device without touching the new hire's data?
A. Asset control
B. Device access control
C. Storage lock out
D. Storage segmentation
Answer: D. Storage segmentation
You might also like to view...
Which of the following should cookies not contain?
a) user postal zip codes b) user preferences c) user passwords d) user settings
After editing Apache configuration files, you must restart the apache2 service with the ____ command.
A. apache2 --reload B. yast -reboot C. rcapache reload D. rcapache2 reload
An XML schema that is attached to a workbook is called an element.
Answer the following statement true (T) or false (F)
In Open System Authentication, how does authentication occur?
a. The client sends a pre-shared key along with the access point's SSID. b. The client requests an encrypted tunnel, after which, the client's MAC serves as the authentication. c. The access point forces the client to authenticate via a captive portal, after which all communication is encrypted. d. The client "authenticates" using only the SSID name. In other words, no real authentication occurs.