Which of the following technical controls is BEST used to define which applications a user can install and run on a company issued mobile device?
A. Authentication
B. Blacklisting
C. Whitelisting
D. Acceptable use policy
Answer: C. Whitelisting
Computer Science & Information Technology
You might also like to view...
To help human readers understand why a method's statements are there, good programmers insert explanatory ____ into their methods.
A. behaviors B. actions C. comments D. conditions
Computer Science & Information Technology
Using Online Storage
What will be an ideal response?
Computer Science & Information Technology
What functions does a protocol analyzer perform at the Physical and Data Link layers of the OSI model?
What will be an ideal response?
Computer Science & Information Technology
The number 5812.69 with the ROUNDDOWN function with zero digits specified displays as ________
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology