Which of the following should be implemented when a personally owned mobile device is used to
access business sensitive data, and the company is concerned with users extracting the
company’s sensitive data from the device?
A.
Device lock and remote wipe should be enforced on the personal device.
B.
A software container policy should wrap and encrypt both the user and company data.
C.
Encryption should be enabled when company data is transmitted and received.
D.
A secure container device policy should separate company data from personal data.
Explanation: