Sensitive data was leaked from a user's smartphone. A technician discovered an unapproved application was installed, and the user has full access to the device's command shell. Which of the following is the NEXT step the technician should take to find the cause of the leaked data?
[Removed]
Highly Voted 2 years, 1 month agoRixon
Most Recent 10 months, 2 weeks agoJay23AmMonsIV
1 year agoRaffaelloo
1 year, 6 months agoshkhsprre
1 year, 8 months agorknard22
1 year, 9 months agomehmibhavna
1 year, 3 months agoEngAbood
1 year, 10 months agoMehsotopes
1 year, 11 months ago