An engineer wants to access sensitive data from a corporate-owned mobile devicE. Personal data is not allowed on the devicE. Which of the following MDM configurations must be considered when the engineer travels for business?
A. Screen locks
B. Application management
C. Geofencing
D. Containerization