Consider the following log event. Assume this device is frequently used, but you cannot control its
use to the extent that is required. What is the most reliable solution to this dilemma?
A.
Add this device to Device Manager
B.
Create e-mail alerts anytime this device is accessed
C.
Create a media audit rule
D.
Require that the device be password encrypted
Explanation: