List of questions
Related questions
Question 78 - ECSS discussion
Wesley, a fitness freak, purchased a new Apple smartwatch and synced it with a mobile app downloaded from an unauthorized third party. At the end of the day, when Wesley attempted to access his fitness report from the app, it generated an unusual report and asked for some unnecessary permissions to view it.
Which of the following mobile risks is demonstrated in the above scenario?
A.
Insecure data storage
B.
Improper platform usage
C.
Client code quality
D.
Insecure authentication
Your answer:
0 comments
Sorted by
Leave a comment first