Which of the following controls can be implemented together to prevent data loss in the event of theft of a mobile device storing sensitive information?
which of the following steps of incident response does a team analyze the incident and determine steps to prevent a future occurrence?