One of the executives wants to use a new smartphone on the corporate network. The first suggestion made to secure the device and the network is to require a PIN or password to access the device. Which of the following would be the best additional step to take?

A. Encrypt the non-volatile memory.
B. Create a corporate policy to prevent sensitive information from residing on a mobile device.
C. Implement single sign-on.
D. Implement antivirus software.

A
Explanation The best single option offered is to encrypt the non-volatile memory on the device which will protect any sensitive data that may reside there.

Computer Science & Information Technology

You might also like to view...

When a user is asked to confirm their age to participate in an online discussion, it is due to the OPRA law

Indicate whether the statement is true or false

Computer Science & Information Technology

A ________ is a document used to promote a business by providing a visual overview using text and objects and containing one or more columns

A) pamphlet B) flyer C) brochure D) leaflet

Computer Science & Information Technology