Which of the following controls can be implemented together to prevent data loss in the event of theft of a mobile device storing sensitive information?

A. Full device encryption
B. Screen locks
C. GPS
D. Asset tracking
E. Inventory control


Answer:
A. Full device encryption
B. Screen locks

Computer Science & Information Technology

You might also like to view...

An array type tag can:

a. Hold only one data type b. Hold more than one data type c. Hold up to 100 values d. Only be used in continuous tasks

Computer Science & Information Technology

To handle situations where a loop must reinitialize a variable at the beginning of each iteration, such re-initialization could be performed by:

a. An assignment statement before the loop body. b. A declaration inside the loop body. c. An assignment statement after the loop body. d. A declaration after the loop body.

Computer Science & Information Technology

Which statement is false?

a. An enum declaration is a comma-separated list of enum constants and may optionally include other components of traditional classes, such as constructors, fields and methods. b. Any attempt to create an object of an enum type with operator new results in a compilation error. c. An enum constructor cannot be overloaded. d. enum constants are implicitly final and static.

Computer Science & Information Technology

?A _________ is a set of commands executed repeatedly until a stopping condition is met.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology