18-C Flashcards

1
Q

What is the primary concern related to root access on Android devices?

A

Root access can compromise security measures and allow unrestricted system-level access

Root access is often associated with exploiting vulnerabilities or using custom firmware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is jailbreaking in the context of iOS?

A

Jailbreaking is the process of obtaining root privileges on iOS devices to sideload apps and customize the interface

This is typically done by booting the device with a patched kernel.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the purpose of Mobile Device Management (MDM) suites?

A

MDM suites detect rooted or jailbroken devices and prevent access to enterprise apps and networks

They can also enforce policies related to app installations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is meant by ‘sideloading’ in Android?

A

Sideloading refers to installing untrusted apps from third-party sources using the .APK file format

This option can weaken device security if not monitored properly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

True or False: Enabling developer mode on a device always weakens its security.

A

False

Developer mode can provide advanced configuration settings but should be used cautiously.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the symptoms of malware in mobile operating systems?

A

Symptoms include:
* High number of ads
* Fake security warnings
* Sluggish response time
* Limited/no Internet connectivity
* Unexpected application behavior
* Leaked personal files/data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is app spoofing?

A

App spoofing is when a malicious app mimics a legitimate app to deceive users into installing it

This often involves using similar names and fake reviews.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are bootleg app stores?

A

Bootleg app stores provide pirated or closely mimicked apps, posing security risks to users

They can lead to malware infections and copyright infringements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Fill in the blank: A trusted app source is managed by a _______.

A

[service provider]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What can users do to mitigate unauthorized location tracking?

A

Users should manage location services and strip geotagging information from images before posting online

This helps protect sensitive information from being exploited.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What should users be cautious of when installing new apps?

A

Users should be cautious of apps that request permissions unrelated to their function

This is especially important even when using approved app stores.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What might excessive power drain on a device indicate?

A

Excessive power drain may indicate malware activity, such as cryptomining

Malware can run background processes that consume resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the risk associated with using third-party app sources on Android?

A

Using third-party app sources exposes the device to potential malware and untrusted applications

It is crucial to monitor and validate any sideloaded apps.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a common indicator of a compromised device?

A

Leaked personal files/data can indicate a compromised device

Users should be alert to unauthorized access notifications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

True or False: All free apps are likely to be malicious due to high ad levels.

A

False

High ad levels can be normal for free apps, but unexpected ads may indicate malware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What should users do if they receive unexpected 2-step verification notifications?

A

Users should investigate potential unauthorized access to their accounts

This could indicate that their credentials have been compromised.

17
Q

What is the function of cryptography in enterprise workspaces?

A

Cryptography protects the workspace and makes it harder to compromise than local agents

It enhances security even when devices are rooted or jailbroken.