Tag: Which of the following best represents a security vulnerability of mobile devices? (select two).