Consider the following imageof log event. Assume the device is frequentlyused, but you cannot
control its use to theextent that isrequired. What is the most reliable solution to this dilemma?
A.
Add the device to the desktop Device Manager
B.
Create email alerts any time the device is accessed
C.
Create a media audit rule
D.
Require that thedevice be passwordencrypted
Explanation: