A user has been granted permission to access the corporate network from a personal smartphone. Which of the following should a technician perform before
configuring the phone for access?
A.
Check the phone for unauthorized root access
B.
Disable the phone’s Bluetooth chip
C.
Erase all personal data from the phone
D.
Check the phone for location tracking