Which of the following should be implemented when a personally owned mobile device is used to access business sensitive data, and the company is concerned with users extracting the company’s sensitive data from the device?

Which of the following should be implemented when a personally owned mobile device is used to access business sensitive data, and the company is concerned with users extracting the company’s sensitive data from the device?
A. Device lock and remote wipe should be enforced on the personal device.
B. A software container policy should wrap and encrypt both the user and company data.
C. Encryption should be enabled when company data is transmitted and received.
D. A secure container device policy should separate company data from personal data.

comptia-exams

Leave a Reply

Your email address will not be published. Required fields are marked *


The reCAPTCHA verification period has expired. Please reload the page.