Which of the following would BEST meet these requirements?

Posted by: Pdfprep Category: SY0-601 Tags: , ,

A security analyst needs to implement an MDM solution for BYOD users that will allow the company to retain control over company emails residing on the devices and limit data exfiltration that might occur if the devices are lost or stolen.

Which of the following would BEST meet these requirements? (Select TWO).
A . Full-device encryption
B . Network usage rules
C . Geofencing
D . Containerization
E . Application whitelisting
F . Remote control

Answer: A,B

Leave a Reply

Your email address will not be published.