Which of the following should be configured to BEST meet the requirements?

A school contracts with a vendor to devise a solution that will enable the school library to lend out tablet computers to students while on site. The tablets must adhere to string security and privacy practices.

The school’s key requirements are to:

✑ Maintain privacy of students in case of loss

✑ Have a theft detection control in place

✑ Be compliant with defined disability requirements

✑ Have a four-hour minimum battery life

Which of the following should be configured to BEST meet the requirements? (Choose two.)
A . Remote wiping
B . Geofencing
C . Antivirus software
D . TPM
E . FDE
F . Tokenization

Answer: A,D

Latest CAS-003 Dumps Valid Version with 509 Q&As

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments