A corporation is issuing tablets to its sales team for use at client sites and wants to ensure sensitive data is protected in case of device loss or theft. As part of the security profile for these devices, which feature should be configured to best prevent unauthorized access to data?
Enforce screen locks with a 4-digit PIN
Configure remote backup applications
Implement strong device encryption
Install locator applications to track lost devices
Configuring a strong device encryption policy is vital in protecting the sensitive data on the tablets in case they are lost or stolen. Encryption ensures that the data cannot be accessed without proper authentication, even if an unauthorized person performs a factory reset on the device. Screen locks, while necessary, can be bypassed and do not protect the data if the device storage is accessed by other means. Locator applications are useful in finding lost devices but do not protect the data if the device cannot be recovered. Remote backup applications are essential for data preservation but do not prevent data access on the lost or stolen device itself.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is device encryption and how does it work?
Open an interactive chat with Bash
What are some common encryption methods used on tablets?
Open an interactive chat with Bash
Why is a screen lock not sufficient for protecting sensitive data?