Which of the following BEST represents a security vulnerability of mobile devices? (Select TWO).
A.
Unauthorized downloads
B.
Viruses
C.
Improper file permissions
D.
Phishing
E.
Theft
Which of the following BEST represents a security vulnerability of mobile devices? (Select TWO).
Which of the following BEST represents a security vulnerability of mobile devices? (Select TWO).
A.
Unauthorized downloads
B.
Viruses
C.
Improper file permissions
D.
Phishing
E.
Theft