List of questions
Related questions
Question 2 - 212-82 discussion
Stephen, a security professional at an organization, was instructed to implement security measures that prevent corporate data leakage on employees' mobile devices. For this purpose, he employed a technique using which all personal and corporate data are isolated on an employee's mobile device.
Using this technique, corporate applications do not have any control of or communication with the private applications or data of the employees.
Which of the following techniques has Stephen implemented in the above scenario?
A.
Full device encryption
B.
Geofencing
C.
Containerization
D.
OTA updates
Your answer:
0 comments
Sorted by
Leave a comment first