Which of the following controls can be implemented together to prevent data loss in the
event of theft of a mobile device storing sensitive information? (Select TWO).
A.
Full device encryption
B.
Screen locks
C.
GPS
D.
Asset tracking
E.
Inventory control