This page mentions malware infection/malicious code first in the paragraph.
Then the rest of the paragraph follows with data leakage, then insecure communications.
Not sure which one to choose here since they all are mentioned on page 407
As a follow up to my last comment, this page also mentions that on the CISSP exam, "mobile devices" should include smartphones, tablets, laptops, smart watches, and fitness trackers fyi
Read the question to know what is asked. Risk and not threat . Common threat is malware like phishing however common risk is data leakage. There is different between risk and threats . Answer is D
I think everyone here would agree that threat and risk have a different definitions. To put it simply: (Risk = Asset x Vulnerability x Threat) So the threat of Malware infecting my phone could lead to the risk of... leaking data. Option D
Agree with D. That is the biggest concern of a business. not specifically about malware.. malware that is doing what... question doesnt say. D is clear and is the best answer.
You must first have malware than follow by data leak.
Also not all mobile have important information to leak. Malware can infect a mobile phone than move to another device when its connected to the office network.
This seems more logical.
https://www.kaspersky.com/resource-center/threats/top-seven-mobile-security-threats-smart-phones-tablets-and-mobile-internet-devices-what-the-future-has-in-store
1) Data Leakage
D. Data leakage ......think of all the apps you installed on your phone. On the other hand, how many times have you had a malware on your phone? For me, never! Imagine all the data leakage that happens with all the apps installed on your phone. D. Data leakage is the correct answer. Guys again stop relying too much on chatgpt. Chatgpt says B. malware which is wrong.
B: Malicious Apps and Websites. Like desktop computers, mobile devices have software and Internet access. Mobile malware (i.e. malicious applications) and malicious websites can accomplish the same objectives (stealing data, encrypting data, etc.)
This is nice reference about most risk for mobile devices. They put Data Leak first:
Data leaks
Before installing a new app on your smartphone, you might want to read the fine print. Nearly every smartphone app collects data from your phone, according to Pargman. That info could include your name, date of birth, credit card and bank account information, location history, contact list, photos, and more.
Ref: https://www.rd.com/article/mobile-security-threats/
!
Seems D is the answer.
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
Joey456
Highly Voted 2 years, 1 month agojackdryan
1 year, 6 months agoshmoeee
11 months, 4 weeks agoshmoeee
11 months, 4 weeks agoSF_NERD
Highly Voted 2 years, 1 month agosomsom
Most Recent 1 month agodeeden
3 months, 3 weeks agoCCNPWILL
7 months, 1 week agodm808
8 months agohoho2000
8 months, 2 weeks agoManU145
11 months agoSoleandheel
11 months, 3 weeks agoljkesmeer
1 year agoDagi_D
1 year, 1 month agonoh_ssiw_l
1 year, 2 months agoVince_F_Fang
1 year, 2 months agoxxxBadManxxx
1 year, 3 months agosomkiatr
1 year, 11 months agooudmaster
1 year, 11 months agooudmaster
1 year, 10 months agotheboa
1 year, 11 months agodumdada
1 year, 5 months agoshmoeee
11 months, 4 weeks ago