When implementing a mobile security strategy for an organization which of the following is the MOST influential concern that contributes to that organization's ability to extend enterprise policies to mobile devices?

A. Support for mobile OS
B. Support of mobile apps
C. Availability of mobile browsers
D. Key management for mobile devices


Answer: D. Key management for mobile devices

Computer Science & Information Technology

You might also like to view...

Which of the following is not a secondary storage device:

a) Hard drive b) Floppy disk c) CD d) ROM

Computer Science & Information Technology

Discuss how variations in activity durations may influence paths through a network and could possibly change which one is the critical path.

What will be an ideal response?

Computer Science & Information Technology

Under __________ memory management, the transient area is treated as a pool of unstructured free space.

a. fixed partition b. dynamic c. virtual d. none of the above

Computer Science & Information Technology

Which of the following choices is not one of the three teaming modes?

A. Switch independent B. Static teaming C. LACP D. Address hashing

Computer Science & Information Technology