Which of the following should the user do to enforce full device confidentiality should the phone be lost or stolen?

A user has an Android smartphone that supports full device encryption. However when the user plus into
a computer all of the files are immediately accessible. Which of the following should the user do to
enforce full device confidentiality should the phone be lost or stolen?

A user has an Android smartphone that supports full device encryption. However when the user plus into
a computer all of the files are immediately accessible. Which of the following should the user do to
enforce full device confidentiality should the phone be lost or stolen?

A.
Establish a PIN passphrase

B.
Agree to remote wipe terms

C.
Generate new media encryption keys

D.
Download the encryption control app from the store



Leave a Reply 0

Your email address will not be published. Required fields are marked *

20 − 8 =