When implementing a mobile security strategy for an organization which of the following is the MOST influential concern that contributes to that organization's ability to extend enterprise policies to mobile devices?
A. Support for mobile OS
B. Support of mobile apps
C. Availability of mobile browsers
D. Key management for mobile devices
Answer: D. Key management for mobile devices
You might also like to view...
Which of the following is not a secondary storage device:
a) Hard drive b) Floppy disk c) CD d) ROM
Discuss how variations in activity durations may influence paths through a network and could possibly change which one is the critical path.
What will be an ideal response?
Under __________ memory management, the transient area is treated as a pool of unstructured free space.
a. fixed partition b. dynamic c. virtual d. none of the above
Which of the following choices is not one of the three teaming modes?
A. Switch independent B. Static teaming C. LACP D. Address hashing