What acronym refers to an environment in which employees provide their own mobile communication devices?
Text messaging makes a mobile device especially susceptible to what type of vulnerability?
D. Signal interception.
Your company wishes to limit its risk for unauthorized access to confidential company data that may be stored on the tablet
computers it issues to employees. Which of the following methods would guarantee that an unauthorized person couldn't access data on a lost or stolen tablet?
B. Data wiping.
What security system involves the use of an analog-to-digital converter (ADC) and either hardware-based encryption or software-based encryption for the transmission of converted signals using the ZRTP protocol?
A. Secure voice.
What form of security policies typically includes measures like secured possession, remote reporting, screen locks, and storage