A user has called the help desk to report an enterprise mobile device was stolen. The technician receiving the call accesses the MDM administration portal to identify the device's last known geographic location. The technician determines the device is still communicating with the MDM. After taking note of the last known location, the administrator continues to follow the rest of the checklist. Which of the following identifies a possible next step for the administrator?

A. Remotely encrypt the device
B. Identify the mobile carrier's IP address
C. Reset the device password
D. Issue a remote wipe command

Answer: D. Issue a remote wipe command

Computer Science & Information Technology

You might also like to view...

A variable that can be used in multiple regions of code is called a universal variable.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Computers store large amounts of data on secondary storage devices as ______.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology