A user has an Android smartphone that supports full device encryption. However, when the user plugs into a
computer all of the files are immediately accessible.
Which of the following should the user do to enforce full device confidentiality should the phone be lost or
stolen?
A.
Establish a PIN passphrase
B.
Agree to remote wipe terms
C.
Generate new media encryption keys
D.
Download the encryption control app from the store