18-A Flashcards
What are the core objectives covered in configuring mobile OS security?
Explain common methods for securing mobile and embedded devices.
Why is it critical to specify mobile-device security practices?
To mitigate the risk that they may introduce vulnerabilities in the company’s network security.
What is the purpose of a screen lock on mobile devices?
To protect against loss, theft, and unauthorized access.
What is the difference between a swipe gesture and a PIN/password in screen lock authentication?
A swipe gesture means access is unauthenticated; a PIN/password requires authentication.
What should be the characteristics of a secure PIN?
Not a simple sequence or easily guessable date.
What are the three types of biometric authentication mechanisms mentioned?
- Fingerprint
- Facial recognition
- Pattern
What happens if a bio gesture fails on a mobile device?
The device can be configured to lock for a set period.
What types of security software can be used on mobile devices?
- Antivirus/anti-malware apps
- Firewall apps
What is the main challenge with Android OS updates?
Updates are reliant on the device vendor to develop patches.
True or false: Mobile devices are generally less vulnerable to malware than PCs.
False
What is the function of firewall apps on mobile devices?
To monitor app activity and prevent connections to unauthorized ports or IP addresses.
What does BYOD stand for in mobile device deployment models?
Bring your own device.
What is Mobile Device Management (MDM)?
Enterprise software designed to apply security policies to smartphones and tablets.
What is device encryption used for?
To secure user data on mobile devices.
What are the two primary cloud services for remote backup on mobile devices?
- iCloud for iOS
- Google Sync for Android
What is the purpose of locator apps in mobile security?
To find lost or stolen devices and perform remote actions like locking or wiping.
What does IoT stand for?
Internet of Things.
What are the components of an IoT smart device network?
- Hub/control system
- Smart device types
- Wireless mesh networking
How can security risks from smart devices in a corporate workspace be mitigated?
Through regular audits and employee security awareness training.
Fill in the blank: If a device is lost, a _______ may be necessary to protect data.
remote wipe
True or false: All user data on iOS devices is always encrypted.
True
What two types of biometric authentication mechanism are supported on smartphones?
- Fingerprint recognition
- Facial recognition
True or false? Updates are not necessary for iOS devices because the OS is closed source.
False
What mobile deployment model is best for minimizing the number of devices and OS versions while allowing personal use?
Bring Your Own Device (BYOD)
Should the IT department have been consulted before provisioning smart appliances in the marketing department?
Yes
What risks do network-enabled devices pose when deployed without proper management?
- Exploitation as access points
- Undocumented vulnerabilities
- Configuration weaknesses
What can mitigate risks associated with network-enabled devices?
- Regular audits
- Employee security awareness training