Which of the following practices circumvents administrative restrictions on smart devices, thereby increasing data security risks?
Rooting.
Eavesdropping.
Man in the middle.
Session hijacking.
Submit