ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 180 - 220-1102 discussion

Report
Export

Sensitive data was leaked from a user's smartphone. A technician discovered an unapproved application was installed, and the user has full access to the device's command shell. Which of the following is the NEXT step the technician should take to find the cause of the leaked data?

A.
Restore the device to factory settings.
Answers
A.
Restore the device to factory settings.
B.
Uninstall the unapproved application.
Answers
B.
Uninstall the unapproved application.
C.
Disable the ability to install applications from unknown sources.
Answers
C.
Disable the ability to install applications from unknown sources.
D.
Ensure the device is connected to the corporate WiFi network.
Answers
D.
Ensure the device is connected to the corporate WiFi network.
Suggested answer: B

Explanation:

The technician should disable the user's access to the device's command shell. This will prevent the user from accessing sensitive data and will help to prevent further data leaks. The technician should then investigate the unapproved application to determine if it is the cause of the data leak. If the application is found to be the cause of the leak, the technician should uninstall the application and restore the device to factory settings. If the application is not the cause of the leak, the technician should investigate further to determine the cause of the leak. Disabling the ability to install applications from unknown sources can help to prevent future data leaks, but it is not the next step the technician should take in this scenario. Ensuring the device is connected to the corporate WiFi network is not relevant to this scenario1

asked 02/10/2024
Felipe Huichacura
31 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first