A security administrator is creating a risk assessment on BYOD.
One of the requirements of the risk assessment is to address the following
• Centrally managing mobile devices
• Data loss prevention
Which of the following recommendations should the administrator include in the assessment? (Select TWO).
A . implement encryption.
B . implement hashing.
C . implement an MDM with mobile device hardening.
D . implement a VPN with secure connection in webmail.
E . implement and allow cloud storage features on the network.
Answer: C, E