A network administrator audited applications on a user’s desktop and noticed a program used to sync a mobile device to the desktop’s calendar.
To ensure corporate data is not exchanged to cloud servers, which of the following mobile security methods should be implemented?
A . Remote wipe
B . Device encryption
C . Biometric authentication
D . Enterprise sandbox
Answer: D