Question: 56
An organization is looking to enhance its endpoint security ...
A company’s IT department has implemented a strict mobile device policy to protect sensitive corporate data. One employee decides to jailbreak their personal iPhone to customize its interface and install third-party applications not available on the official App Store. Shortly after, the company notices unusual network traffic originating from the employee's device.
What is the MOST likely and the MOST serious security vulnerability introduced by the employee’s action?
Share your thoughts, provide feedback, or discuss the question and answer below. You can also help others by answering their questions or providing additional information. Thank you for contributing! 🙏
No comments yet. Be the first to comment!