Scan QR code or get instant email to install app
Download ITEXAM Prep app now
Scan QR code or get instant email to install app
Question:
Data on the device can be accessed by authorized users who access the device through unintended connections or by unauthorized users who access to absconded devices (for example, with root access). Every company should have a policy in place for protecting data (encryption) and responding to data leaks when they happen.