context-aware authentication and full device encryption. Even with these settings in place, an unattended phone
was used by a malicious actor to access corporate data. Which of the following additional controls should be
put in place first?
A. GPS tagging
B. Remote wipe
C. Screen lock timer
D. SEAndroid