When implementing a mobile security strategy for an organization which of the following is the MOST influential concern that contributes to that organization's ability to extend enterprise policies to mobile devices?

A. Support for mobile OS
B. Support of mobile apps
C. Availability of mobile browsers
D. Key management for mobile devices

Answer: D. Key management for mobile devices

Computer Science & Information Technology

You might also like to view...

Match the following e-payment methods with their descriptions

6. Limited purpose cards a. Their value is stored electronically on the device via an integrated circuit chip. 7. Stored value cards b. They are used for a wide range of purposes, may cross geographic boundaries, and may be used by any user. 8. Internet payment services c. They are used only for a finite number of purposes, and are issued by a particular merchant, telecommunications provider, or transit company. 9. Prepaid cards d. They involve payments that rely on a bank account and use the Internet as a means of transferring funds to or from an established financial account. 10. Open system cards e. They are attached to an account and they provide access to monetary funds that are paid in advance by the cardholder.

Computer Science & Information Technology

Code ________ promotes the development of error-free programs because the programmer does not need to repeatedly solve the same problems.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology