Your company is considering allowing personal smartphones to be given access to the network. Which of the following functions is NOT a key requirement that should be imposed on the allowed smartphones?
A. remote wipe
B. encryption
C. geotagging
D. DLP
C
Explanation: While geotagging allows locating the devices, the other functions would be much more important to require.
Computer Science & Information Technology
You might also like to view...
A homegroup network has five computers, six users, three printers, and a scanner. How many passwords are needed to secure it?
a. Five b. Six c. Three d. One
Computer Science & Information Technology
You can traverse a 2-3 tree in sorted order by performing the analogue of a(n) _______ traversal on a binary tree.
a. pre-order b. post-order c. tri-order d. in-order
Computer Science & Information Technology