A security administrator has concerns that employees are installing unapproved applications on their company provide smartphones. Which of the following would BEST mitigate this?
A. Implement remote wiping user acceptance policies
B. Disable removable storage capabilities
C. Implement an application whitelist
D. Disable the built-in web browsers
Answer: C. Implement an application whitelist
You might also like to view...
The ____ print style prints a page for each contact.
A. Card B. Memo C. Phone Directory D. Small Booklet
The breakpoint:
A) is a range containing a lookup table. B) is a reference to a cell containing a value to look up. C) is the lowest value for a specific category or series in a lookup table. D) looks up a value and returns a related result from the lookup table.
By default, when you create a custom table style, it is available for use:
A) in any document. B) in any template. C) only in the selected table. D) only in the current document.
The ________ startup type is started by the logged on user or by a program only when it is needed
Fill in the blank(s) with correct word