A user has an Android smartphone that supports full device encryption. However when the user plus into a computer all of the files are immediately accessible. Which of the following should the user do to enforce full device confidentiality should the phone be lost or stolen?
A. Establish a PIN passphrase
B. Agree to remote wipe terms
C. Generate new media encryption keys
D. Download the encryption control app from the store
Answer: A. Establish a PIN passphrase
Computer Science & Information Technology
You might also like to view...
From the perspective of an Alice program, you can think of a flow as the sequence of statements that are performed when you click the ____ button.
A. Do B. New C. Run D. Start
Computer Science & Information Technology
What additional standalone subscriptions are available within Office 365?
A) QuickBooks Online B) ADP Payroll C) Microsoft Project Online, Power BI, Visio Pro, and Azure Rights Management D) ADP Payroll, QuickBooks Online, SimpleWriter, and Microsoft Works E) None of the above
Computer Science & Information Technology