Which of the following BEST represents a security vulnerability of mobile devices? (Select TWO).
A.
Unauthorized downloads
B.
Viruses
C.
Improper file permissions
D.
Phishing
E.
Theft
Which of the following BEST represents a security vulnerability of mobile devices? (Select TWO).
Which of the following BEST represents a security vulnerability of mobile devices? (Select TWO).
A.
Unauthorized downloads
B.
Viruses
C.
Improper file permissions
D.
Phishing
E.
Theft
The answers are NOT vulnerabilities. They are logical and physical threats. A vulnerability is a coding or config error. Viruses use EXPLOITS to leverage vulnerabilities. Theft, well, I have no idea. I would say Unauthorized downloads and file permissions would be a better answer.
Well, they’re not. So deal.