An organization wants to allow its employees to receive corporate email on their own smartphones.
A security analyst is reviewing the following information contained within the file system of an employee’s smartphone:
FamilyPix.jpg
Taxreturn.tax
paystub.pdf
employeesinfo.xls
SoccerSchedule.doc
RecruitmentPlan.xls
Based on the above findings, which of the following should the organization implement to prevent further exposure? (Select two).
A . Remote wiping
B . Side loading
C . VPN
D . Containerization
E . Rooting
F . Geofencing
G . Jailbreaking
Answer: AC