A security administrator is selecting an MDM solution for an organization, which has strict security
requirements for the confidentiality of its data on end user devices. The organization decides to
allow BYOD, but requires that users wishing to participate agree to the following specific device
configurations; camera disablement, password enforcement, and application whitelisting. The
organization must be able to support a device portfolio of differing mobile operating systems.
Which of the following represents the MOST relevant technical security criteria for the MDM?
A.
Breadth of support for device manufacturers’ security configuration APIS
B.
Ability to extend the enterprise password polices to the chosen MDM
C.
Features to support the backup and recovery of the stored corporate data
D.
Capability to require the users to accept an AUP prior to device onboarding