Exam 220-1102 All QuestionsBrowse all questions from this exam
Question 213

Sensitive data was leaked from a user's smartphone. A technician discovered an unapproved application was installed, and the user has full access to the device's command shell. Which of the following is the NEXT step the technician should take to find the cause of the leaked data?

    Correct Answer: A

    The next step the technician should take is to restore the device to factory settings. Restoring the device to factory settings will remove all installed applications, data, and configurations, effectively wiping the device clean. This is crucial because it will eliminate any potential malicious software or unauthorized applications that might have caused the data leak. It will ensure that the device's security is reset to its original state, allowing the technician to determine if the leak was due to a compromise in the device itself or through the installed applications.

Discussion
[Removed]Option: B

From removing it you'll know what caused it or not

MehsotopesOption: B

The application coming from an unknown location should have never existed in the first place and phone has likely been rooted and jailbroken.

Jay23AmMonsIVOption: A

Restoring the device to factory settings is crucial to eliminate any potential malicious configurations or unauthorized access that may have contributed to the leaked data. It effectively removes all data and applications, resetting the device to its original state. This step helps in identifying if the leak was due to a compromise in the device itself or through the installed applications.

RaffaellooOption: B

B is correct Unauthorized software increases the risk of outsiders gaining access to sensitive data. Any software that is not authorized is likely managed without proper patching, updates, configurations, and security protocols

shkhsprreOption: A

According to chatgpt: The next step the technician should take to find the cause of the leaked data and address the security issue is: A. Restore the device to factory settings. Restoring the device to factory settings (also known as a factory reset) will remove all installed applications, data, and configurations, effectively wiping the device clean. This is a crucial step because it will remove any potential malware or unauthorized applications that might be causing the data leakage and remove any suspicious configurations. It's a comprehensive measure to ensure the device is in a clean and secure state.

rknard22Option: C

C. Disable the ability to install applications from unknown sources. Disabling the ability to install applications from unknown sources is a crucial step because it prevents the installation of potentially malicious apps that may have contributed to the data leak. By doing this, you can enhance the security of the device and reduce the risk of further data breaches.

mehmibhavna

This is not a corporate device then how can you restrict download,

EngAbood

b , c are correct for me , sooooooooo ??