While troubleshooting a compromised Android handset, you learn the user had enabled Developer Options so they could manually install a beta game downloaded from a third-party website. Soon afterward, the phone began generating unexpected network traffic and a root shell was discovered. According to CompTIA best practices, which security concern MOST likely led to the infection?
Using NFC peer-to-peer to share applications
Pairing with unencrypted Bluetooth headphones
Disabling automatic operating system updates
Installing applications from an unofficial application source
Manually installing an APK obtained from a website means the user bypassed the vetted Google Play Store and used an unofficial application source. Apps from unofficial sources are not subjected to the same security screening, greatly increasing the risk of embedded malware that can escalate privileges or open remote shells. NFC sharing and Bluetooth pairing do not directly explain how the malicious APK was introduced, and simply disabling automatic OS updates would not on its own install new software.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is an APK and why is it risky to install from unofficial sources?
Open an interactive chat with Bash
What are Developer Options on Android, and why are they a security risk?
Open an interactive chat with Bash
How does installing malware lead to unexpected network traffic or root shells?