Which of the following should be configured to BEST meet the requirements?
A school contracts with a vendor to devise a solution that will enable the school library to lend out tablet computers to students while on site. The tablets must adhere to string security and privacy practices.
The school’s key requirements are to:
✑ Maintain privacy of students in case of loss
✑ Have a theft detection control in place
✑ Be compliant with defined disability requirements
✑ Have a four-hour minimum battery life
Which of the following should be configured to BEST meet the requirements? (Choose two.)
A . Remote wiping
B . Geofencing
C . Antivirus software
D . TPM
E . FDE
F . Tokenization
Answer: A,D
Latest CAS-003 Dumps Valid Version with 509 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund
Subscribe
Login
0 Comments
Inline Feedbacks
View all comments