18 Flashcards
Which of the following answers refers to a broadband cellular network technology?
4G/5G
A 2.4/5.0 GHz frequency range wireless network technology implemented in the IEEE 802.11 series of standards is commonly referred to as
WiFi
A popular, 2.4 GHz short-range wireless technology used for connecting various personal devices in a WPAN is known as:
Bluetooth
Which of the following answers refers to a security feature used in Bluetooth device pairing?
PIN
A very short-range communication method where a wireless signal is sent between two devices that are touching or nearly touching each other is a characteristic feature of:
** NFC **
Near Field Communication (NFC)
Which of the answers listed below refers to a short distance, line-of-sight technology used for example in home remote controls?
** IR **
Infrared (IR)
Which of the following would prevent using a mobile device for data exfiltration via cable connection?
DLP
A mobile device’s built-in functionality enabling the usage of locator applications is called:
GPS
Which type of software enables a centralized administration of mobile devices?
MDM
Which of the following facilitates the enforcement of mobile device policies and procedures?
MDM
Which of the following allows to erase data on a lost or stolen mobile device?
Remote wipe
A type of technology that provides control over the usage of a mobile device within a designated area is referred to as:
** Geofencing **
Geofencing creates a virtual geographical boundary that triggers a marketing action to a mobile device when a user enters or exits that boundary. An administrator or developer first establishes a virtual boundary around a certain location in GPS- or RFID-enabled software.
A user interface element controlling access to a mobile device after the device is powered on is called:
Screen lock
The term “Push notification” is used to describe information delivery from a server to a client performed without a specific request from the client.
True
Context-aware authentication strengthens the authentication process by requiring the standard user credentials (username and password) to be coupled with additional items that can be used in the authentication process, such as:
- Connection type used
- Time of the day login patterns
- Geolocation
- Type of device used
- IP address
All of the above
In the context of MDM, the isolation of corporate applications and data from other parts of the mobile device is referred to as:
** Containerization **
MDM containerization refers to the process of segregating personal and corporate data on personal devices by creating a logical container to enhance corporate data security
A mobile security solution that enables separate controls over the user and enterprise data is called:
** Storage segmentation **
Containerization uses technical methods to store the data. This is often referred to as storage segmentation and it stores the data in a secure container. In this context, a secure container is typically an area on the device protected by both authentication and encryption
MicroSD HSM is an example of a dedicated cryptographic processor residing on a miniature flash memory card. MicroSD HSM can be used to create, manage, and store cryptographic keys on any device with a matching card slot.
True
MicroSD HSM is a hardware security module coming in the form of a microSD card. It provides security services driven by hardware-based crypto engines, including encryption, key generation and key life cycle management, digital signature, authentication and other cryptographic functions.
Implementing full device encryption is one of the methods for securing sensitive data on a smartphone. When enabled, this type of encryption works in conjunction with the phone’s screen lock, i.e. to decrypt the phone (which stays encrypted whenever the phone is locked), a user must first unlock the screen. On Android devices, the unlocking methods include entering a PIN, password, or swipe pattern. Apple devices use passcode and biometric fingerprint sensor (a.k.a. Touch ID).
True
Which of the following answers refers to a software tool that provides a single management interface for mobile devices, PCs, printers, IoT devices and wearables?
** UEM **
Unified Endpoint Management (UEM) allows IT to manage, secure, and deploy corporate resources and applications on any device from a single console
Which of the following answers refers to a dedicated mobile app management software?
** MAM **
Mobile application management (MAM) is software that secures and enables IT control over enterprise applications on end users’ corporate and personal smartphones and tablets. MAM software allows IT administrators to apply and enforce corporate policies on mobile apps and limit the sharing of corporate data among apps.
A type of mobile OS implementing more strict, Linux-based access security controls is known as:
** SEAndroid **
SEAndroid refers to Security Enhancements for Android, a security solution for Android that identifies and addresses critical gaps
Installing mobile apps from trusted sources (e.g. Apple’s App Store for iOS devices, or Google Play for Android devices) instead of third-party application stores decreases malware-related security risks.
True
The term “Rooting” refers to the capability of gaining administrative access to the operating system and system applications on:
Android devices
Which of the following terms is used to describe the process of removing software restrictions imposed by Apple on its iOS operating system?
Jailbreaking