An employee in your organization has reported that their company-issued mobile device is suddenly displaying unexpected behaviors, such as the installation of unknown applications and modification of system settings without their input. You suspect that the device may have undergone unauthorized modifications. What is the BEST step to take to confirm your suspicion?
Scan the device using the latest security software.
Perform a factory reset on the mobile device.
Verify unusual app permissions in the device settings.
Check for the presence of superuser access applications on the device.