After an internal review of a potentially compromised BYOD device, its determined that the user side-loaded a malicious app on the personal profile that harvested their contacts. Why was none of the data in the work profile accessible?
(A) Work profile sandboxing and app isolation prevented any access to the work data.
(B) The user detected unusual activity before the app had time to infect the work profile and turned off the phone.
(C) The IT admin noticed unusual activity in the personal profile and asked the user to bring IT the phone in for review.
(D) The device had a weak 4 digit device passcode policy so the app was able to access all information.