(CO 5) In an environment in which mobile devices are self-selected by users
(CO 5) In an environment in which mobile devices are self-selected by users or the organization has not yet
implemented any technology to control the security configuration of mobile devices, a _____ allows the organization to protect the data no matter what device is in use.
device-centric
data-centric
process-centric
user-centric
CO 4) Data at rest must rely on the protection mechanisms provided by their container.
communications channel.
motion.
mobile device.