medium
Single Answer
0

Evaggelia needs to control access to applications that are deployed to mobile devices in a BYOD environment. What type of solution will best allow her to exercise control over the applications while ensuring that they do not leave remnant data on the devices used by her end users?

Answer Options

A

Deploy the applications to the BYOD devices and require unique PINs on every device.

B

Deploy the application to desktop systems and require users to use remote desktop to access them using enterprise authentication.

C

Deploy the applications to the BYOD devices using application containers and require unique PINs on every device.

D

Use a virtual hosted application environment that requires authentication using enterprise credentials.

Correct Answer: D

Explanation

When very high levels of control are needed or when endpoint devices cannot be trusted, using a centralized environment with remote connectivity and enterprise authentication can provide appropriate security.