Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

ECCouncil Computer Hacking Forensic Investigator (CHFIv11) 312-49v11 Question # 9 Topic 1 Discussion

ECCouncil Computer Hacking Forensic Investigator (CHFIv11) 312-49v11 Question # 9 Topic 1 Discussion

312-49v11 Exam Topic 1 Question 9 Discussion:
Question #: 9
Topic #: 1

A digital forensic investigator is examining a mobile device recovered from a suspect in a cybercrime case. The device appears to be running a custom operating system configuration that allows for elevated privileges and unrestricted access to system resources .

What is the most likely method used to achieve this configuration?


A.

Installing a custom ROM on the Android device


B.

Exploiting a vulnerability in the iOS device ' s firmware


C.

Rooting the Android device


D.

Jailbreaking the iOS device


Get Premium 312-49v11 Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.