One of the executives wants to use a new smartphone on the corporate network. The first suggestion made to secure the device and the network is to require a PIN or password to access the device. Which of the following would be the best additional step to take?
A. Encrypt the non-volatile memory.
B. Create a corporate policy to prevent sensitive information from residing on a mobile device.
C. Implement single sign-on.
D. Implement antivirus software.
A
Explanation The best single option offered is to encrypt the non-volatile memory on the device which will protect any sensitive data that may reside there.
Computer Science & Information Technology
You might also like to view...
When a user is asked to confirm their age to participate in an online discussion, it is due to the OPRA law
Indicate whether the statement is true or false
Computer Science & Information Technology
A ________ is a document used to promote a business by providing a visual overview using text and objects and containing one or more columns
A) pamphlet B) flyer C) brochure D) leaflet
Computer Science & Information Technology