During a security evaluation, you discover unauthorized software on employee phones that overrides factory restrictions and modifies system-level settings. Which approach best describes how the attacker obtains these privileges?
They exploited weak wireless authentication to intercept private communications
They captured login tokens to move across the enterprise network
They disabled built-in security layers through a means that unlocks restricted controls
They used deceptive messages to gather login details from phone users
Disabling protections imposed by the device manufacturer (often seen in jailbreaking or rooting) grants higher privilege levels. This exceeds the capabilities of typical data theft or network injection, because it provides a deeper level of control over the operating system. Methods involving network or credential capture do not inherently grant elevated rights to the core settings.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What does 'jailbreaking' or 'rooting' a device mean?
Open an interactive chat with Bash
How does jailbreaking/rooting differ from hacking a user account?
Open an interactive chat with Bash
What are the security risks of using a jailbroken or rooted device?