An executive's personal mobile device used for business purposes is reported lost. The information security manager should respond based on:
A. mobile device configuration.
B. asset management guidelines.
C. the business impact analysis (BIA).
D. incident classification.
A. mobile device configuration.
B. asset management guidelines.
C. the business impact analysis (BIA).
D. incident classification.