What is the best defense against attacks to mobile devices?
A. Know what information is on the device
B. Work in a deactivating mechanism
C. Never store sensitive in the device
D. Anticipate the loss
Answer: D
Computer Science & Information Technology
You might also like to view...
Identification and authentication is part of the _______ class of security controls.
A. technical B. operational C. management D. none of the above
Computer Science & Information Technology
This standard defines the six subsystems of a structured cabling system
What will be an ideal response?
Computer Science & Information Technology