During a recent security meeting, the last item on the agenda was a discussion of the remote wipe feature. To which corporate devices would this feature be deployed?
A. firewalls
B. messaging servers
C. smartphones
D. servers
C
Explanation: Remote wipe can be used to remotely erase a mobile device when it is discovered stolen.
You might also like to view...
A(n) ________ is a worksheet where totals from other sheets are displayed
Fill in the blank(s) with correct word
Which of the following statements is false?
a) A delegate variable can hold a reference to any method. b) The real power of delegates is in passing method references as arguments to methods. c) A method name can be passed directly to a delegate parameter, rather than first assigning it to a delegate variable. d) A delegate type is declared by preceding a method header with keyword delegate (placed after any access specifiers, such as public or private) and following the method header with a semicolon.