The chief Risk officer is concerned about the new employee BYOD device policy and has requested the security department implement mobile security controls to protect corporate data in the event that a device is lost or stolen. The level of protection must not be compromised even if the communication SIM is removed from the device. Which of the following BEST meets the requirements?

A. Asset tracking
B. Screen-locks
C. GEO-Tracking
D. Device encryption


Answer:
A. Asset tracking
D. Device encryption

Computer Science & Information Technology

You might also like to view...

A table is a group of related fields for a single entity

Indicate whether the statement is true or false

Computer Science & Information Technology

A C++ class can be declared as a(n) ____ having all private data members and all public member functions.

a. object b. two-dimensional array c. array d. structure

Computer Science & Information Technology

Case 14-1Natasha is using collections to organize data in a program that organizes processes such as CPU and printer access.Natasha should use a(n) ____.

A. stack B. list C. queue D. map

Computer Science & Information Technology

The ________ displays below the Slide pane and provides space for you to type information regarding the active slide.

a. Notes pane b. Slide pane c. Slides/Outline pane d. Status bar

Computer Science & Information Technology