during the reconnaissance phase of a penetration test, you have determined that your client's employees all use android smartphones that connect back to the corporate network over a secure vpn connection. which of the following methods would most likely be the best method for exploiting these? use web-based exploits against the devices web interfaces identify a jailbroken device for easy exploitation use social engineering to trick a user into opening a malicious apk use a tool like icssploit to target specific vulnerabilities see all questions back next question