Your company is considering allowing personal smartphones to be given access to the network. Which of the following functions is NOT a key requirement that should be imposed on the allowed smartphones?
A. remote wipe
B. encryption
C. geotagging
D. DLP
C
Explanation: While geotagging allows locating the devices, the other functions would be much more important to require.
You might also like to view...
Which of these is not a characteristic of display screen output?
A) available on a more flexible schedule B) can be more targeted to the user C) can be changed through direct interaction D) ephemeral E) portable
Which range of numbers is used to indicate that a standard ACL is being configured?
A) 2000-2699 B) 100-199 C) 1-99 D) 1300-1999
The value of a literal string passed as an argument to the alert() method is displayed in the ____.
A. pop-up dialog box B. Web browser C. error log D. Windows system monitor
?Structured application development usually involves a(n) _____, which proceeds from a general design to a detailed structure.
A. ?top-down approach B. ?test plan C. ?training plan D. ?integrated approach