A security team received the following requirements for a new BYOD program that will allow employees to use personal smartphones to access business email:
• Sensitive customer data must be safeguarded.
• Documents from managed sources should not be opened in unmanaged destinations.
• Sharing of managed documents must be disabled.
• Employees should not be able to download emailed images to their devices.
• Personal photos and contact lists must be kept private.
• IT must be able to remove data from lost/stolen devices or when an employee no longer works for the company.
Which of the following are the best features to enable to meet these requirements? (Choose two.)