Which of the following is a best practice for protecting mobile devices that use RDP to access highly sensitive information? (Select TWO).
A. Block network connectivity
B. Block internal storage
C. Block personal backup
D. Block firewall traffic
E. Block SD storage