A systems administrator wants to protect data stored on mobile devices that are used to scan and record assets in a warehouse. The control must automatically destroy the secure container of mobile devices if they leave the warehouse. Which of the following should the administrator implement? (Choose two.)
Figekioki
Highly Voted 3 years, 10 months ago20Panda08
3 years, 10 months agoPWashko
Most Recent 2 years, 3 months agoMohammadQ
3 years, 9 months agoms230000751
3 years, 9 months agoSamgran
3 years, 9 months agoekinzaghi
3 years, 10 months ago