[TABS_R id=9422]
A network administrator audited applications on a user’s desktop and noticed a program used to sync a mobile device to the desktop’s calendar. To ensure corporate data is not exchanged to cloud servers, which of the following mobile security methods should be implemented?
- Remote wipe
- Device encryption
- Biometric authentication
- Enterprise sandbox
[TABS_R id=9422]