During a recent security meeting, the last item on the agenda was a discussion of the remote wipe feature. To which corporate devices would this feature be deployed?

A. firewalls
B. messaging servers
C. smartphones
D. servers

C
Explanation: Remote wipe can be used to remotely erase a mobile device when it is discovered stolen.

Computer Science & Information Technology

You might also like to view...

A(n) ________ is a worksheet where totals from other sheets are displayed

Fill in the blank(s) with correct word

Computer Science & Information Technology

Which of the following statements is false?

a) A delegate variable can hold a reference to any method. b) The real power of delegates is in passing method references as arguments to methods. c) A method name can be passed directly to a delegate parameter, rather than first assigning it to a delegate variable. d) A delegate type is declared by preceding a method header with keyword delegate (placed after any access specifiers, such as public or private) and following the method header with a semicolon.

Computer Science & Information Technology