A user has an Android smartphone that supports full device encryption. However when the user plus into a computer all of the files are immediately accessible. Which of the following should the user do to enforce full device confidentiality should the phone be lost or stolen?

A. Establish a PIN passphrase
B. Agree to remote wipe terms
C. Generate new media encryption keys
D. Download the encryption control app from the store

Answer: A. Establish a PIN passphrase

Computer Science & Information Technology

You might also like to view...

From the perspective of an Alice program, you can think of a flow as the sequence of statements that are performed when you click the ____ button.

A. Do B. New C. Run D. Start

Computer Science & Information Technology

What additional standalone subscriptions are available within Office 365?

A) QuickBooks Online B) ADP Payroll C) Microsoft Project Online, Power BI, Visio Pro, and Azure Rights Management D) ADP Payroll, QuickBooks Online, SimpleWriter, and Microsoft Works E) None of the above

Computer Science & Information Technology