Multiple Choice
A network administrator audited applications on a user's desktop and noticed a program used to sync a mobile device to the desktop's calendar. To ensure corporate data is not exchanged to cloud servers, which of the following mobile security methods should be implemented?
A) Remote wipe
B) Device encryption
C) Biometric authentication
D) Enterprise sandbox
Correct Answer:

Verified
Correct Answer:
Verified
Q249: A desktop technician is responsible for the
Q250: Many of the files in a user's
Q251: A corporate fileshare holds files for multiple
Q252: A network support technician takes a call
Q253: A technician encounters a previously unidentified issue.
Q255: Which of the following technologies can be
Q256: Ann, a user, calls the help desk
Q257: Corporate management is concerned about the security
Q258: A small office's wireless network was compromised
Q259: A technician is restoring files, which were