our organization has recently purchased 20 tablet devices for the Human Resource department to use for training sessions.
You are concerned that these devices could represent a security risk to your network and want to strengthen their security profile as much as possible.
Which actions should you take? (Select two. Each response is a separate solution.)