Michelle is in charge of her organization's mobile device management efforts and handles lost and stolen devices. Which of the following recommendations will provide the most assurance to her organization that data will not be lost if a device is stolen?

A. Mandatory passcodes and application management
B. Full device encryption and mandatory passcodes
C. Remote wipe and GPS tracking
D. Enabling GPS tracking and full device encryption


Answer: B. Full device encryption and mandatory passcodes

Computer Science & Information Technology

You might also like to view...

When the user clicks any of the three standard JFrame buttons, a ___________ is generated.

(a) window listener (b) window event (c) window activator (d) window deactivator

Computer Science & Information Technology

Items drawn in merge mode are called ____________________.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Before you can add a new email account in Outlook, you must have an account set up with a(n) ____.

A. email service provider B. office C. Backstage provider D. website

Computer Science & Information Technology

The rows in the tables are called ____________________.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology