Your company is considering allowing personal smartphones to be given access to the network. Which of the following functions is NOT a key requirement that should be imposed on the allowed smartphones?

A. remote wipe
B. encryption
C. geotagging
D. DLP

C
Explanation: While geotagging allows locating the devices, the other functions would be much more important to require.

Computer Science & Information Technology

You might also like to view...

A homegroup network has five computers, six users, three printers, and a scanner. How many passwords are needed to secure it?

a. Five b. Six c. Three d. One

Computer Science & Information Technology

You can traverse a 2-3 tree in sorted order by performing the analogue of a(n) _______ traversal on a binary tree.

a. pre-order b. post-order c. tri-order d. in-order

Computer Science & Information Technology