A user has an Android smartphone that supports full device encryption. However when the user plus into a computer all of the files are immediately accessible. Which of the following should the user do to enforce full device confidentiality should the phone be lost or stolen?
A. Establish a PIN passphrase
B. Agree to remote wipe terms
C. Generate new media encryption keys
D. Download the encryption control app from the store