Question 105:
An organization enables BYOD but wants to allow users to access the corporate email, calendar, and contacts from their devices. The data associated with the user`s accounts is sensitive, and therefore, the organization wants to comply with the following requirements: ✑ Active full-device encryption ✑ Enabled remote-device wipe ✑ Blocking unsigned applications ✑ Containerization of email, calendar, and contacts Which of the following technical controls would BEST protect the data from attack or loss and meet the above requirements?
Answer options:
A. Require frequent password changes and disable NFC.B. Enforce device encryption and activate MAM. C. Install a mobile antivirus application. D. Configure and monitor devices with an MDM.