A user has called the help desk to report an enterprise mobile device was stolen. The technician receiving the call accesses the MDM administration portal to identify the device’s last known geographic location. The technician determines the device is still communicating with the MDM. After taking note of the last known location, the administrator continues to follow the rest of the checklist. Which of the following identifies a possible next step for the administrator?
A. Remotely encrypt the device
B. Identify the mobile carrier’s IP address
C. Reset the device password
D. Issue a remote wipe command