Get Unlimited Contributor Access to the all ExamTopics Exams!
Take advantage of PDF Files for 1000+ Exams along with community discussions and pass IT Certification Exams Easily.
This page mentions malware infection/malicious code first in the paragraph.
Then the rest of the paragraph follows with data leakage, then insecure communications.
Not sure which one to choose here since they all are mentioned on page 407
As a follow up to my last comment, this page also mentions that on the CISSP exam, "mobile devices" should include smartphones, tablets, laptops, smart watches, and fitness trackers fyi
Agree with D. That is the biggest concern of a business. not specifically about malware.. malware that is doing what... question doesnt say. D is clear and is the best answer.
You must first have malware than follow by data leak.
Also not all mobile have important information to leak. Malware can infect a mobile phone than move to another device when its connected to the office network.
This seems more logical.
https://www.kaspersky.com/resource-center/threats/top-seven-mobile-security-threats-smart-phones-tablets-and-mobile-internet-devices-what-the-future-has-in-store
1) Data Leakage
D. Data leakage ......think of all the apps you installed on your phone. On the other hand, how many times have you had a malware on your phone? For me, never! Imagine all the data leakage that happens with all the apps installed on your phone. D. Data leakage is the correct answer. Guys again stop relying too much on chatgpt. Chatgpt says B. malware which is wrong.
B: Malicious Apps and Websites. Like desktop computers, mobile devices have software and Internet access. Mobile malware (i.e. malicious applications) and malicious websites can accomplish the same objectives (stealing data, encrypting data, etc.)
This is nice reference about most risk for mobile devices. They put Data Leak first:
Data leaks
Before installing a new app on your smartphone, you might want to read the fine print. Nearly every smartphone app collects data from your phone, according to Pargman. That info could include your name, date of birth, credit card and bank account information, location history, contact list, photos, and more.
Ref: https://www.rd.com/article/mobile-security-threats/
!
Seems D is the answer.
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
Joey456
Highly Voted 1 year, 7 months agojackdryan
1 year agoshmoeee
5 months, 1 week agoshmoeee
5 months, 1 week agoSF_NERD
Highly Voted 1 year, 7 months agoCCNPWILL
Most Recent 3 weeks, 3 days agodm808
1 month, 2 weeks agohoho2000
1 month, 4 weeks agoManU145
4 months, 2 weeks agoSoleandheel
5 months, 1 week agoljkesmeer
6 months, 2 weeks agoDagi_D
6 months, 3 weeks agonoh_ssiw_l
7 months, 4 weeks agoVince_F_Fang
8 months, 2 weeks agoxxxBadManxxx
9 months agosomkiatr
1 year, 4 months agooudmaster
1 year, 4 months agooudmaster
1 year, 4 months agotheboa
1 year, 4 months agodumdada
11 months, 1 week agoshmoeee
5 months, 1 week agohalonsx
1 year, 5 months agorootic
1 year, 6 months ago