PdfPrep.com

Which of the following would BEST meet these requirements?

A security analyst needs to implement an MDM solution for BYOD users that will allow the company to retain control over company emails residing on the devices and limit data exfiltration that might occur if the devices are lost or stolen.

Which of the following would BEST meet these requirements? (Select TWO).
A . Full-device encryption
B . Network usage rules
C . Geofencing
D . Containerization
E . Application whitelisting
F . Remote control

Answer: A,B

Exit mobile version