IT Questions and Answers :)

animated-update-image-0026

COVID-19 India HEAT MAP

A message to our readers about COVID-19

With the uncertainty surrounding the outbreak of the corona virus. We want to reassure our reader stay safe and Healthy.Be aware and alert. Work as one nation. Sanitize and disinfect all equipment before entering your home, work and anywhere.

Monday, September 30, 2019

Which of the following would you use to allow your users to discuss sensitive information on their mobile devices without having to travel to secure locations?

Which of the following would you use to allow your users to discuss sensitive information on their mobile devices without having to travel to secure locations?

  • GPS tracking
  • Passcode policy
  • Voice encryption
  • Remote wipe 
Which of the following would you use to allow your users to discuss sensitive information on their mobile devices without having to travel to secure locations?

EXPLANATION

GPS tracking To get real-time results, IMEI & GPS call trackers can be used to track the location of a phone call. Apps like GPS Phone & Locate Any Phone are great with tracking mobile phones, even when the phone is not connected to the internet. You can know the GPS coordinates of a phone number within seconds.

Passcode policy Mobile devices often do not have passwords enabled. Mobile devices often lack passwords to authenticate users and control access to data stored on the devices. Many devices have the technical capability to support passwords, personal identification numbers (PIN), or pattern screen locks for authentication. Some mobile devices also include a biometric reader to scan a fingerprint for authentication. However, anecdotal information indicates that consumers seldom employ these mechanisms. Additionally, if users do use a password or PIN they often choose passwords or PINs that can be easily determined or bypassed, such as 1234 or 0000. Without passwords or PINs to lock the device, there is increased risk that stolen or lost phones' information could be accessed by unauthorized users who could view sensitive information and misuse mobile devices.


 





Share:

0 comments:

Post a Comment

Popular Posts