Employees are permitted to bring personally owned portable computers that run Windows 8
to the office. They are permitted to install corporate applications by using the management
infrastructure agent and access corporate email by using Windows Mail. An employee’s
personally owned portable computer is stolen. You need to protect the corporate
applications and email messages on the computer. Which two actions should you perform?
(Each correct answer presents part of the solution. Choose two.)
A.
Prevent the computer from connecting to the corporate wireless network.
B.
Disconnect the computer from the management infrastructure.
C.
Change the user’s password.
D.
Initiate a remote wipe.
Explanation:
D: A Remote Wipe is the process where a device is selected from a central
Microsoft Exchange or management console and chosen to be wiped, for example if the
device has been lost by the owner. The Remote Wipe command is then sent to the device
via ActiveSync.
For a device such as a Windows Phone, all data is deleted, including email, contacts,
calendar for all accounts and other data on the device such as documents and picture.
However, when ActiveSync Remote Wipe is performed against a Windows 8 or Windows RT
device, the scope of the wipe is more limited. Only the email, contacts, and calendar for
information stored in the built-in Mail application are deleted. Other data on the system is not
deleted, including information from the Microsoft Office Outlook client.