The chief Risk officer is concerned about the new employee BYOD device policy and has requested the
security department implement mobile security controls to protect corporate data in the event that a device is
lost or stolen. The level of protection must not be compromised even if the communication SIM is removed
from the device. Which of the following BEST meets the requirements? (Choose two.)
A: Asset tracking is the process of maintaining oversight over inventory, and ensuring that a device is still in the
possession of the assigned authorized user.
D: Device encryption encrypts the data on the device. This feature ensures that the data on the device cannot
be accessed in a useable form should the device be stolen.