An executive’s personal mobile device used for business purposes is reported lost. The information security manager should respond based on:
A . mobile device configuration.
B . asset management guidelines.
C . the business impact analysis (BIA).
D . incident classification.
Answer: D