An organization enables BYOD but wants to allow users to access the corporate email, calendar, and contacts from their devices. The data associated with the user’s accounts is sensitive, and therefore, the organization wants to comply with the following requirements: Active full-device encryption Enabled remote-device wipe Blocking unsigned applications Containerization of email, calendar, and contacts Which of the following technical controls would BEST protect the data from attack or loss and meet the abo
A. Require frequent password changes and disable NFC
B. Enforce device encryption and activate MAM
C. Install a mobile antivirus application
D. Configure and monitor devices with an MD