What is the best defense against attacks to mobile devices?

A. Know what information is on the device
B. Work in a deactivating mechanism
C. Never store sensitive in the device
D. Anticipate the loss

Answer: D

Computer Science & Information Technology

You might also like to view...

Identification and authentication is part of the _______ class of security controls.

A. technical B. operational C. management D. none of the above

Computer Science & Information Technology

This standard defines the six subsystems of a structured cabling system

What will be an ideal response?

Computer Science & Information Technology