Your company is considering allowing personal smartphones to be given access to the network. Which of the following functions is NOT a key requirement that should be imposed on the allowed smartphones?

A. remote wipe
B. encryption
C. geotagging
D. DLP


C
Explanation: While geotagging allows locating the devices, the other functions would be much more important to require.

Computer Science & Information Technology

You might also like to view...

Which of these is not a characteristic of display screen output?

A) available on a more flexible schedule B) can be more targeted to the user C) can be changed through direct interaction D) ephemeral E) portable

Computer Science & Information Technology

Which range of numbers is used to indicate that a standard ACL is being configured?

A) 2000-2699 B) 100-199 C) 1-99 D) 1300-1999

Computer Science & Information Technology

The value of a literal string passed as an argument to the alert() method is displayed in the ____.

A. pop-up dialog box B. Web browser C. error log D. Windows system monitor

Computer Science & Information Technology

?Structured application development usually involves a(n) _____, which proceeds from a general design to a detailed structure.

A. ?top-down approach B. ?test plan C. ?training plan D. ?integrated approach

Computer Science & Information Technology