Which of the following is the MOST appropriate control measure for lost mobile devices?
A.
Disable unnecessary wireless interfaces such as Bluetooth.
B.
Reduce the amount of sensitive data stored on the device.
C.
Require authentication before access is given to the device.
D.
Require that the compromised devices be remotely wiped.