A company implemented an MDM policy to mitigate risks after repeated instances of employees losing company-provided mobile phones. In several cases, the lost phones were used maliciously to perform social engineering attacks against other employees. Which of the following MDM features should be configured to best address this issue? (Choose two.)
1403ad2
Highly Voted 1 year, 6 months agojaneyyyyyy322
1 year agojohnabayot
Highly Voted 1 year, 7 months agoGigi42
Most Recent 1 year, 1 month agozero_pa
1 year, 1 month agoMimikatz4Exam
1 year, 3 months agomikzer
1 year, 4 months agops1hacker
1 year, 5 months agoekiel
1 year, 5 months agocannon
1 year, 6 months agoNetworkTester1235
1 year, 4 months agokewokil120
1 year, 6 months agoStaticK9
1 year, 6 months agoimnewtothis
1 year, 6 months agoGigi42
1 year, 1 month agokewokil120
1 year, 6 months agoBenrosan
1 year, 6 months agoThatDetroitGuy
1 year, 6 months agocaseymd85
1 year, 6 months agoArunRavilla
1 year, 6 months ago