On a mobile device, enforcing a policy that erases a device after a number of failed login
attempts is used to prevent which of the following?

A.
Unauthorized application installations
B.
Brute forcing
C.
Social engineering
D.
Man-in-the-middle attack