A cyber architect is writing a paper on root activity security concerns and the use of developer mode. What are the characteristics of placing a device into developer mode? (Select all that apply) a) Increased security protocols b) Access to system-level settings c) Ability to test custom software d) Bypassing certain restrictions