Posted by: Pdfprep
Post Date: May 17, 2021
A security analyst is implementing mobile device security for a company. To save money, management has decided on a BYOD model. The company is most concerned with ensuring company data will not be exposed if a phone is lost or stolen.
Which of the following techniques BEST accomplish this goal? (Choose two.)
A . Containerization
B . Full device encryption
C . Geofencing
D . Remote wipe
E . Application management
F . Storage segmentation
Answer: BD
Leave a Reply