secure mobile solutions Flashcards
1
Q
_____ is a term that became popular for exploits that enabled the user to obtain root privileges, sideload apps, change or add carriers, and customize the interface.
A
Jailbreaking
2
Q
_____ is the practice of creating a virtual boundary based on real-world geography. An organization may use geofencing to create a perimeter around its office property.
A
Geofencing