Jane, an IT security technician, needs to create a way to secure company mobile devices. Which
of the following BEST meets this need?
A.
Implement voice encryption, pop-up blockers, and host-based firewalls.
B.
Implement firewalls, network access control, and strong passwords.
C.
Implement screen locks, device encryption, and remote wipe capabilities.
D.
Implement application patch management, antivirus, and locking cabinets.