Which of the following vulnerabilities is associated with installing software outside of a manufacturer’s approved software repository?
Which of the following vulnerabilities is associated with installing software outside of a manufacturer’s approved software repository?
A . Jailbreaking
B . Memory injection
C . Resource reuse
D . Side loading
Answer: D
Explanation:
Side loading is the process of installing software outside of a manufacturer’s approved software repository. This can expose the device to potential vulnerabilities, such as malware, spyware, or unauthorized access. Side loading can also bypass security controls and policies that are enforced by the manufacturer or the organization. Side loading is often done by users who want to access applications or features that are not available or allowed on their devices.
References = Sideloading – CompTIA Security + Video Training | Interface Technical Training, Security+ (Plus) Certification | CompTIA IT Certifications, Load Balancers C CompTIA Security+ SY0-501 C 2.1, CompTIA Security+ SY0-601 Certification Study Guide.
Latest SY0-701 Dumps Valid Version with 77 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund