A cyber architect is writing a paper on root activity security concerns and the use of developer mode. What are the characteristics of placing a device into developer mode? (Select all that apply)
a) Increased security protocols
b) Access to system-level settings
c) Ability to test custom software
d) Bypassing certain restrictions