PdfPrep.com

To ensure corporate data is not exchanged to cloud servers, which of the following mobile security methods should be implemented?

A network administrator audited applications on a user’s desktop and noticed a program used to sync a mobile device to the desktop’s calendar.

To ensure corporate data is not exchanged to cloud servers, which of the following mobile security methods should be implemented?
A . Remote wipe
B . Device encryption
C . Biometric authentication
D . Enterprise sandbox

Answer: D

Exit mobile version