A company has a security policy that specifies all endpoint computing devices should be assigned a unique identifier that can be tracked via an inventory management system. Recent changes to airline security regulations have cause many executives in the company to travel with mini tablet devices instead of laptops. These tablet devices are difficult to tag and track. An RDP application is used from the tablet to connect into the company network.Which of the following should be implemented in order to meet the security policy requirements?
A. Virtual desktop infrastructure (IDI)
B. WS-security and geo-fencing
C. A hardware security module (HSM)
D. RFID tagging system
E. MDM software
F. Security Requirements Traceability Matrix (SRTM)
Ans: E. MDM software
You might also like to view...
Algorithm __________ randomly orders a List's elements.
a. randomShuffle. b. randomPlacement. c. fiftyTwoCardPickup. d. shuffle.
Create a series of C R C cards for World’s Trend Catalog Division. Once an order is placed, the order fulfillment crew takes over and checks for availability, fills the order, and calculates the total amount of the order. Use five C R C cards, one for each of the following classes: order, order fulfillment, inventory, product, and customer. Complete the section on classes, responsibilities, and collaborators.
What will be an ideal response?
Kathy wants to display the row labels in a single column. Which PivotTable layout should Kathy use?
What will be an ideal response?
The _______________ takes control of the boot process from the system BIOS.
A. boot sector B. CMOS C. MBR D. POST