She assured you that her smart phone was never misplaced prior to the attack.She assured you that her smart phone was never misplaced prior to the attack.Which security weakness is the most likely cause of the security breach?Which security weakness is the most likely cause of the security breach?Sideloaded apps were installed on her smart phone.Sideloaded apps were installed on her smart phone.Geo-tagging was enabled on her smart phone.Geo-tagging was enabled on her smart phone.An Xmas Tree attack was executed on her smart phone.An Xmas Tree attack was executed on her smart phone.Weak passwords were used on her smart phone.Weak passwords were used on her smart phone.
ExplanationExplanationGeo-tagging embeds GPS coordinates within mobile device files (such as image or video files)Geo-tagging embeds GPS coordinates within mobile device files (such as image or video files)created with the device's camera. While this feature can be useful in some circumstances, it cancreated with the device's camera. While this feature can be useful in some circumstances, it canalso create security concerns. In this scenario, the vice president probably posted geo-taggedalso create security concerns. In this scenario, the vice president probably posted geo-taggedimages to her social media accounts. The attacker likely analyzed the images to discover whereimages to her social media accounts. The attacker likely analyzed the images to discover whereshe lives and then conducted a dumpster dive attack that yielded the sticky note with the viceshe lives and then conducted a dumpster dive attack that yielded the sticky note with the vicepresident's VPN credentials. The best way to remedy this weakness is to simply disable thispresident's VPN credentials. The best way to remedy this weakness is to simply disable thisfunctionality in the mobile devices you manage.functionality in the mobile devices you manage.Sideloaded apps can only be installed if the device administrator has specifically configured theSideloaded apps can only be installed if the device administrator has specifically configured thedevice to allow them, so this is an unlikely cause. A weak smart phone password is a concern,device to allow them, so this is an unlikely cause. A weak smart phone password is a concern,but would not be the cause of the exploit if the device was always in the vice president'sbut would not be the cause of the exploit if the device was always in the vice president'spossession. An Xmas Tree attack is used to fingerprint network devices, not to gather personallypossession. An Xmas Tree attack is used to fingerprint network devices, not to gather personallyidentifying information.identifying information.[All Questions SecPro2017_v6.exm MOB_DEV_MGMT_04][All Questions SecPro2017_v6.exm MOB_DEV_MGMT_04]
Upload your study docs or become a
Course Hero member to access this document
Upload your study docs or become a
Course Hero member to access this document
End of preview. Want to read all 46 pages?
Upload your study docs or become a
Course Hero member to access this document
Term
Fall
Professor
N/A
Tags