A security administrator has concerns that employees are installing unapproved applications on their company provide smartphones. Which of the following would BEST mitigate this?

A. Implement remote wiping user acceptance policies
B. Disable removable storage capabilities
C. Implement an application whitelist
D. Disable the built-in web browsers


Answer: C. Implement an application whitelist

Computer Science & Information Technology

You might also like to view...

The ____ print style prints a page for each contact.

A. Card B. Memo C. Phone Directory D. Small Booklet

Computer Science & Information Technology

The breakpoint:

A) is a range containing a lookup table. B) is a reference to a cell containing a value to look up. C) is the lowest value for a specific category or series in a lookup table. D) looks up a value and returns a related result from the lookup table.

Computer Science & Information Technology

By default, when you create a custom table style, it is available for use:

A) in any document. B) in any template. C) only in the selected table. D) only in the current document.

Computer Science & Information Technology

The ________ startup type is started by the logged on user or by a program only when it is needed

Fill in the blank(s) with correct word

Computer Science & Information Technology