Q: 16
After installing an unapproved application on a personal device, a Chief Executive Officer reported an
incident to a security analyst. This device is not controlled by the MDM solution, as stated in the
BYOD policy. However, the device contained critical confidential information. The cyber incident
response team performed the analysis on the device and found the following log:
Which of the following is the most likely reason for the successful attack?
Which of the following is the most likely reason for the successful attack?Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.