Last Updated on August 5, 2021 by Admin 2
A network administrator audited applications on a user’s desktop and noticed a program used to sync a mobile device to the desktop’s calendar. To ensure corporate data is not exchanged to cloud servers, which of the following mobile security methods should be implemented?
- Remote wipe
- Device encryption
- Biometric authentication
- Enterprise sandbox