Which of the following technical controls is BEST used to define which applications a user can install and run on a company issued mobile device?

A. Authentication
B. Blacklisting
C. Whitelisting
D. Acceptable use policy


Answer: C. Whitelisting

Computer Science & Information Technology

You might also like to view...

To help human readers understand why a method's statements are there, good programmers insert explanatory ____ into their methods.

A. behaviors B. actions C. comments D. conditions

Computer Science & Information Technology

Using Online Storage

What will be an ideal response?

Computer Science & Information Technology

What functions does a protocol analyzer perform at the Physical and Data Link layers of the OSI model?

What will be an ideal response?

Computer Science & Information Technology

The number 5812.69 with the ROUNDDOWN function with zero digits specified displays as ________

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology