A network administrator audited applications on a user’s desktop and noticed a program used to sync a mobile device to the desktop’s calendar. To ensure corporate data is not exchanged to cloud servers, which of the following mobile security methods should be implemented?

Last Updated on August 5, 2021 by Admin 2

A network administrator audited applications on a user’s desktop and noticed a program used to sync a mobile device to the desktop’s calendar. To ensure corporate data is not exchanged to cloud servers, which of the following mobile security methods should be implemented?

  • Remote wipe
  • Device encryption
  • Biometric authentication
  • Enterprise sandbox
0 0 votes
Article Rating
Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments