Which of the following is the BEST option to prevent data breaches on lost mobile devices?
A.
Install a locator application on the mobile device so that it can be traced.
B.
Apply a restriction to lock the device after a certain number of failed login attempts.
C.
Configure the device to remote wipe as soon as it is reported lost.
D.
Utilize the fingerprint scanner and passcode for multifactor authentication.