Which of the following BEST represents a security vulnerability of mobile devices?

Which of the following BEST represents a security vulnerability of mobile devices? (Select TWO).

Which of the following BEST represents a security vulnerability of mobile devices? (Select TWO).

A.
Unauthorized downloads

B.
Viruses

C.
Improper file permissions

D.
Phishing

E.
Theft



Leave a Reply 2

Your email address will not be published. Required fields are marked *


Jim

Jim

The answers are NOT vulnerabilities. They are logical and physical threats. A vulnerability is a coding or config error. Viruses use EXPLOITS to leverage vulnerabilities. Theft, well, I have no idea. I would say Unauthorized downloads and file permissions would be a better answer.

Henry

Henry

Well, they’re not. So deal.