A small company has recently purchased cell phones for managers to use while working outside of the office. The company does not currently have a budget for mobile device management and is primarily concerned with deterring leaks if sensitive information obtained by unauthorized access to unattended phones. Which of the following would provide the solution BEST meets the company's requirements?
A. Screen-lock
B. Disable removable storage
C. Full device encryption
D. Remote wiping
Answer: A. Screen-lock
You might also like to view...
When a method terminates, the values of its local variables are ________.
a. saved b. copied c. restored d. lost
It’s possible to have various functions with the same name that operate on different types or numbers of arguments. This is called function _____________.
Fill in the blank(s) with the appropriate word(s).
An entity whose content is found within the DTD is known as a(n) external entity.
Answer the following statement true (T) or false (F)
____ typically displays advertising banners or pop-up ads and is frequently encountered while visiting Web sites with a browser.
A. Logic bomb B. Adware C. Spam D. Phishing