15.01.2024 Views

CompTIA A+ Certification All-in-One Exam Guide

  • No tags were found...

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

should always be weighed against the risk, especially when it comes to

deciding whether to allow jailbroken/rooted devices on your network.

NOTE Organizational networks may use an MDM to detect and block

devices that have used one of these methods to remove restrictions.

The manufacturer or service provider may prevent a device from

connecting to their services if they detect the change. There are also

immediate risks: a failed attempt could brick the device, or perhaps just

render it unusable until you restore it completely from a backup (removing

the jailbreaking/rooting software in the process).

Unauthorized Location Tracking

We discussed the benefits of GPS and location tracking earlier, but there are

also risks involved. Configuration settings in the OS and apps may allow a

user’s location to be sent to third parties, sometimes without explicit consent

or knowledge. The best way to prevent this is to turn off the GPS function or

location services unless they are needed. Another way is to configure the

device and apps that use geotracking to prevent unauthorized tracking, if the

device allows it. Some apps—or specific features—simply won’t work until

geotracking is enabled (see Figure 25-19).

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!