A small company has recently purchased cell phones for managers to use while working outside of the office. The company does not currently have a budget for mobile device management and is primarily concerned with deterring leaks if sensitive information obtained by unauthorized access to unattended phones. Which of the following would provide the solution BEST meets the company's requirements?

A. Screen-lock
B. Disable removable storage
C. Full device encryption
D. Remote wiping


Answer: A. Screen-lock

Computer Science & Information Technology

You might also like to view...

When a method terminates, the values of its local variables are ________.

a. saved b. copied c. restored d. lost

Computer Science & Information Technology

It’s possible to have various functions with the same name that operate on different types or numbers of arguments. This is called function _____________.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

An entity whose content is found within the DTD is known as a(n) external entity.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

____ typically displays advertising banners or pop-up ads and is frequently encountered while visiting Web sites with a browser.

A. Logic bomb B. Adware C. Spam D. Phishing

Computer Science & Information Technology