18-A Flashcards

1
Q

What are the core objectives covered in configuring mobile OS security?

A

Explain common methods for securing mobile and embedded devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Why is it critical to specify mobile-device security practices?

A

To mitigate the risk that they may introduce vulnerabilities in the company’s network security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the purpose of a screen lock on mobile devices?

A

To protect against loss, theft, and unauthorized access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the difference between a swipe gesture and a PIN/password in screen lock authentication?

A

A swipe gesture means access is unauthenticated; a PIN/password requires authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What should be the characteristics of a secure PIN?

A

Not a simple sequence or easily guessable date.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the three types of biometric authentication mechanisms mentioned?

A
  • Fingerprint
  • Facial recognition
  • Pattern
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What happens if a bio gesture fails on a mobile device?

A

The device can be configured to lock for a set period.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What types of security software can be used on mobile devices?

A
  • Antivirus/anti-malware apps
  • Firewall apps
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the main challenge with Android OS updates?

A

Updates are reliant on the device vendor to develop patches.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

True or false: Mobile devices are generally less vulnerable to malware than PCs.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the function of firewall apps on mobile devices?

A

To monitor app activity and prevent connections to unauthorized ports or IP addresses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What does BYOD stand for in mobile device deployment models?

A

Bring your own device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is Mobile Device Management (MDM)?

A

Enterprise software designed to apply security policies to smartphones and tablets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is device encryption used for?

A

To secure user data on mobile devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the two primary cloud services for remote backup on mobile devices?

A
  • iCloud for iOS
  • Google Sync for Android
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the purpose of locator apps in mobile security?

A

To find lost or stolen devices and perform remote actions like locking or wiping.

17
Q

What does IoT stand for?

A

Internet of Things.

18
Q

What are the components of an IoT smart device network?

A
  • Hub/control system
  • Smart device types
  • Wireless mesh networking
19
Q

How can security risks from smart devices in a corporate workspace be mitigated?

A

Through regular audits and employee security awareness training.

20
Q

Fill in the blank: If a device is lost, a _______ may be necessary to protect data.

A

remote wipe

21
Q

True or false: All user data on iOS devices is always encrypted.

22
Q

What two types of biometric authentication mechanism are supported on smartphones?

A
  • Fingerprint recognition
  • Facial recognition
23
Q

True or false? Updates are not necessary for iOS devices because the OS is closed source.

24
Q

What mobile deployment model is best for minimizing the number of devices and OS versions while allowing personal use?

A

Bring Your Own Device (BYOD)

25
Q

Should the IT department have been consulted before provisioning smart appliances in the marketing department?

26
Q

What risks do network-enabled devices pose when deployed without proper management?

A
  • Exploitation as access points
  • Undocumented vulnerabilities
  • Configuration weaknesses
27
Q

What can mitigate risks associated with network-enabled devices?

A
  • Regular audits
  • Employee security awareness training