Which of the following, if implemented, would improve security of remote users by reducing vulnerabilities
associated with data-in-transit?
A.
Full-disk encryption
B.
A virtual private network
C.
A thin-client approach
D.
Remote wipe capability
Which of the following, if implemented, would improve security of remote users by reducing vulnerabilities
associated with data-in-transit?
Which of the following, if implemented, would improve security of remote users by reducing vulnerabilities
associated with data-in-transit?
A.
Full-disk encryption
B.
A virtual private network
C.
A thin-client approach
D.
Remote wipe capability