Which of the following is the BEST option to prevent data breaches on lost mobile devices?
A. Install a locator application on the mobile device so that it can be traced.
B. Apply a restriction to lock the device after a certain number of failed login attempts.
C. Configure the device to remote wipe as soon as it is reported lost.
D. Utilize the fingerprint scanner and passcode for multifactor authentication.