A systems administrator wants to protect data stored on mobile devices that are used to scan and record assets in a warehouse.
The control must automatically destroy the secure container of mobile devices if they leave the warehouse.
Which of the following should the administrator implement? (Choose two.)
Click on the arrows to vote for the correct answer
A. B. C. D. E.AE.
To protect the data stored on mobile devices used for scanning and recording assets in a warehouse, the administrator should implement containerization and geofencing.
Containerization is the process of creating a secure and isolated environment on a mobile device to protect sensitive data from unauthorized access. A secure container separates personal and work-related data and apps on a device, allowing the administrator to manage and protect the work-related data and apps in the container. If the mobile device is lost or stolen, the container can be wiped remotely, deleting all the work-related data and apps within the container, leaving personal data unaffected.
Geofencing is the process of setting up a virtual perimeter around a physical location, such as a warehouse, using GPS, RFID, or Wi-Fi signals. If a mobile device equipped with geofencing capabilities leaves the warehouse, it can trigger an action, such as automatically wiping the secure container, as specified by the administrator. Geofencing can be used to prevent sensitive data from leaving the warehouse or other designated secure areas.
Therefore, the administrator should implement containerization to secure the data and geofencing to automatically destroy the secure container if the mobile devices leave the warehouse. The other options such as Near-field communication, Push notification services are not directly relevant to the requirement of protecting data stored on mobile devices in a warehouse and remote wipe can be an option but it does not automatically trigger when devices leave the warehouse, which is the requirement here.