The Chief Risk Officer is concerned about the new employee BYOD device policy and has
requested the security department implement mobile security controls to protect corporate data in
the event that a device is lost or stolen. The level of protection must not be compromised even if
the communication SIM is removed from the device. Which of the following BEST meets the
requirements? (Select TWO).
A.
Asset tracking
B.
Screen-locks
C.
Geo-tagging
D.
Patch management
E.
Device encryption