A company implemented an MDM policy to mitigate risks after repeated instances of employees losing company-provided mobile phones. In several cases, the lost phones were used maliciously to perform social engineering attacks against other employees. Which of the following MDM features should be configured to best address this issue? (Choose two.)
1403ad2
Highly Voted 1 year, 2 months agojaneyyyyyy322
9 months, 3 weeks agojohnabayot
Highly Voted 1 year, 4 months agoGigi42
Most Recent 10 months, 2 weeks agozero_pa
10 months, 3 weeks agoMimikatz4Exam
1 year agomikzer
1 year agops1hacker
1 year, 1 month agoekiel
1 year, 2 months agocannon
1 year, 2 months agoNetworkTester1235
1 year agokewokil120
1 year, 3 months agoStaticK9
1 year, 3 months agoimnewtothis
1 year, 3 months agoGigi42
10 months, 2 weeks agokewokil120
1 year, 3 months agoBenrosan
1 year, 3 months agoThatDetroitGuy
1 year, 3 months agocaseymd85
1 year, 3 months agoArunRavilla
1 year, 3 months ago