Which of the following techniques has Stephen implemented in the above scenario?
Stephen, a security professional at an organization, was instructed to implement security measures that prevent corporate data leakage on employees’ mobile devices. For this purpose, he employed a technique using which all personal and corporate data are isolated on an employee’s mobile device. Using this technique, corporate applications do not have any control of or communication with the private applications or data of the employees.
Which of the following techniques has Stephen implemented in the above scenario?
A . Full device encryption
B. Geofencing
C. Containerization
D. OTA updates
Answer: C
Latest 212-82 Dumps Valid Version with 60 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund
Subscribe
Login
0 Comments
Inline Feedbacks
View all comments