Which of the following methods is the BEST to be implemented to prevent unauthorized users from obtaining this information?

An employee at a company lost their mobile device that contains proprietary information.
Which of the following methods is the BEST to be implemented to prevent unauthorized
users from obtaining this information?

An employee at a company lost their mobile device that contains proprietary information.
Which of the following methods is the BEST to be implemented to prevent unauthorized
users from obtaining this information?

A.
Lock screen pattern

B.
Cancel mobile service

C.
Remote wipe

D.
Six character password

Explanation:

Reference:
http://www.mobiledevicemanager.com/mobile-device-security/remote-wipe/



Leave a Reply 0

Your email address will not be published. Required fields are marked *