Matt, the IT administrator, wants to ensure that if any mobile device gets lost no data can be retrieved. Which of the following can he implement on the mobile devices to help accomplish this?

A. Cable locks
B. Strong passwords
C. Voice encryption
D. Remote sanitization


Answer: D. Remote sanitization

Computer Science & Information Technology

You might also like to view...

Which of the following is an advantage of the D-Link DFL-2560 Office Firewall?

A) It supports white listing and blacklisting. B) It has built-in intrusion detection systems. C) It combines multiple firewall types. D) All of the above

Computer Science & Information Technology

The integrated file browser enables the Web developer to browse files that are outside of his or her site.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

The Goal Seek ________ box must contain a formula or function

Fill in the blank(s) with correct word

Computer Science & Information Technology

The core network, also referred to as a __________ network, connects geographically dispersed fog networks as well as provides access to other networks that are not part of the enterprise network.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology