试题详情
- 单项选择题Which of the following security policies is BEST to use when trying to mitigate the risks involved with allowing a user to access company email via their cell phone?()
A、The cell phone should require a password after a set period of inactivity.
B、The cell phone should only be used for company related emails.
C、The cell phone data should be encrypted according to NIST standards.
D、The cell phone should have data connection abilities disabled.
- A
关注下方微信公众号,在线模考后查看
热门试题
- Which of
- A new floppy drive w
- Which of the followi
- An administrator has
- Which of the followi
- Which of
- Which of
- When creating&
- A user re
- A workstation is add
- Which of the followi
- A technician convert
- Which of the followi
- After applying a new
- How can
- A user states that t
- Which of the followi
- Which of
- Which of the followi
- Which of