PrepAway - Latest Free Exam Questions & Answers

Which of the following should be implemented when a personally owned mobile device is used to access business

Which of the following should be implemented when a personally owned mobile device is used to
access business sensitive data, and the company is concerned with users extracting the
company’s sensitive data from the device?

PrepAway - Latest Free Exam Questions & Answers

A.
Device lock and remote wipe should be enforced on the personal device.

B.
A software container policy should wrap and encrypt both the user and company data.

C.
Encryption should be enabled when company data is transmitted and received.

D.
A secure container device policy should separate company data from personal data.

Explanation:


Leave a Reply