Which of the following should a technician perform befo…

A user has been granted permission to access the corporate network from a personal smartphone. Which of
the following should a technician perform before configuring the phone for access?

A user has been granted permission to access the corporate network from a personal smartphone. Which of
the following should a technician perform before configuring the phone for access?

A.
Check the phone for unauthorized root access

B.
Disable the phone’s Bluetooth chip

C.
Erase all personal data from the phone

D.
Check the phone for location tracking



Leave a Reply 1

Your email address will not be published. Required fields are marked *


Chino Jose Navarro

Chino Jose Navarro

Rooted Android device users can access core system files, reconfigure system settings and install apps they otherwise couldn’t. But rooting opens a device up to security risks that can compromise sensitive data and jeopardize enterprise resources.

Despite all the cool tricks users can do with a rooted Android device, messing with the OS does have its consequences. If a user disables an important system app or deletes a critical system file, the device might no longer operate properly. One wrong move and a phone or tablet could be rendered totally useless. In some cases, rooting a device can invalidate the manufacturer’s warranty.

Allowing apps to access the OS, other apps and system files can also have security ramifications. Hackers have been known to develop apps that look innocent enough but actually steal data and/or disable the device. Once malicious code has root access, it can do just about anything, from deleting critical files to retrieving account information to installing kernel modules or rootkits. Cybercriminals have been developing malware that specifically targets rooted Android devices — and have been doing so for a while.