A security team received the following requirements for a new BYOD program that will allow employees to use personal smartphones to access business email:
• Sensitive customer data must be safeguarded.
• Documents from managed sources should not be opened in unmanaged destinations.
• Sharing of managed documents must be disabled.
• Employees should not be able to download emailed images to their devices.
• Personal photos and contact lists must be kept private.
• IT must be able to remove data from lost/stolen devices or when an employee no longer works for the company.
Which of the following are the best features to enable to meet these requirements? (Choose two.)
Rhots
Highly Voted 1 year, 6 months agoRhots
1 year, 6 months agoAnt0507
1 year, 5 months agoDarkSonicHDD
Highly Voted 1 year, 5 months agoDarkSonicHDD
1 year, 5 months agolycheez
Most Recent 11 months agoxBrynlee
11 months agoLayinCable
1 year agoshady23
1 year, 1 month agorussian
1 year, 1 month agoBD69
1 year, 2 months agoElle
1 year, 3 months agobuscan422
1 year, 4 months agokhadijah028
1 year, 5 months agoAndrii1137
1 year, 5 months agoLord_Chamba
1 year, 6 months agoLord_Chamba
1 year, 6 months agoLord_Chamba
1 year, 5 months agocrazee_mentalist
1 year, 5 months agoLuckyAro
1 year, 6 months agoComPCertOn
1 year, 6 months agoProdamGarazh
1 year, 6 months agochimz2002
1 year, 6 months ago