A network administrator audited applications on a user's desktop and noticed a program used to sync a mobile device to the desktop's calendar. To ensure corporate data is not exchanged to cloud servers, which of the following mobile security methods should be implemented?
A) Remote wipe
B) Device encryption
C) Biometric authentication
D) Enterprise sandbox
Correct Answer:
Verified
Q313: A technician is adding a folder to
Q314: After a virus outbreak due to USB
Q315: Joe, a user, is unable to log
Q316: A technician needs to connect to a
Q317: A technician needs to ensure users are
Q319: Which of the following standards controls the
Q320: A technician is updating a Windows computer
Q321: A user reports that an application has
Q322: An administrator is creating a new user
Q323: Joe, a user, is receiving automated replies
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents