To ensure corporate data is not exchanged to cloud servers, which of the following mobile security methods should be implemented?

Posted by: Pdfprep Category: 220-1002 Tags: , ,

A network administrator audited applications on a user’s desktop and noticed a program used to sync a mobile device to the desktop’s calendar.

To ensure corporate data is not exchanged to cloud servers, which of the following mobile security methods should be implemented?
A . Remote wipe
B . Device encryption
C . Biometric authentication
D . Enterprise sandbox

Answer: D

Leave a Reply

Your email address will not be published.