Geoff wants to ensure the application of consistent security settings to devices used throughout his organisation whether as part of a mobile computing or a BYOD approach.
What technology would be MOST beneficial to his organisation?
Enabling clipboard sharing or client drive redirection doesn't seem relevant to the specific requirements outlined in the question. I'm leaning towards option B.
This seems like a straightforward question about project management processes. I'll need to recall what the Distribute Information process is responsible for and then match that to the potential outputs listed.
I think the second option sounds familiar, especially about the Service Agent pattern. It seems like adding an agent for logging is a good way to handle failures.
upvoted 0 times
...
Log in to Pass4Success
Sign in:
Report Comment
Is the comment made by USERNAME spam or abusive?
Commenting
In order to participate in the comments you need to be logged-in.
You can sign-up or
login
Verdell
4 months agoRyann
4 months agoRaul
4 months agoEric
4 months agoGerald
5 months agoPedro
5 months agoMitsue
5 months agoJulianna
5 months agoCarla
5 months agoLynelle
5 months ago