On a mobile device, enforcing a policy that erases a device after a number of failed login attempts is used to prevent which of the following?
A. Unauthorized application installations
B. Brute forcing
C. Social engineering
D. Man-in-the-middle attack