An organization is developing its mobile device management policies and procedures and is concerned about vulnerabilities that are associated with sensitive data being saved to a mobile device, as well as weak authentication when using a PIN. As part of some discussions on the topic, several solutions are proposed.
Which of the following controls, when required together, will address the protection of data-at- rest as well as strong authentication? (Choose two.)
A . Containerization
B . FDE
C . Remote wipe capability
D . MDM
E . MFA
F . OTA updates
Answer: BE
Latest SY0-501 Dumps Valid Version with 1130 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund