List of questions
Related questions
Question 265 - 220-1102 discussion
Which of the following should be used to secure a device from known exploits?
A.
Encryption
B.
Remote wipe
C.
Operating system updates
D.
Cross-site scripting
Your answer:
0 comments
Sorted by
Leave a comment first