Which of the following can BEST be implemented on a mobile phone to help prevent any sensitive data from being recovered if the phone is lost?

A. Voice encryption
B. Screen locks
C. Device encryption
D. GPS tracking


Answer: C. Device encryption

Computer Science & Information Technology

You might also like to view...

Text that displays in long quotation format will display:

A) with both left and right margin indents. B) centered between margins. C) left aligned. D) with justified alignment.

Computer Science & Information Technology

if-else examples can also be called ____ because they contain the action taken when the tested condition is true and the action taken when it is false.

A. do loops B. single-alternative selections C. repetition D. dual-alternative selections

Computer Science & Information Technology

A technician is wiring up a new rack. Which of the following is the appropriate place for the power cord to wire this rack correctly?

A. One power supply from each server should go to differing PDUs B. Each PDU should be plugged into a separate UPS C. Each UPS should be plugged into a different circuit D. Nothing should be plugged into the wall other than the UPSs

Computer Science & Information Technology

To access and process all of the items in an ArrayList, a for-each loop can be used.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology