18-C Flashcards
What is the primary concern related to root access on Android devices?
Root access can compromise security measures and allow unrestricted system-level access
Root access is often associated with exploiting vulnerabilities or using custom firmware.
What is jailbreaking in the context of iOS?
Jailbreaking is the process of obtaining root privileges on iOS devices to sideload apps and customize the interface
This is typically done by booting the device with a patched kernel.
What is the purpose of Mobile Device Management (MDM) suites?
MDM suites detect rooted or jailbroken devices and prevent access to enterprise apps and networks
They can also enforce policies related to app installations.
What is meant by ‘sideloading’ in Android?
Sideloading refers to installing untrusted apps from third-party sources using the .APK file format
This option can weaken device security if not monitored properly.
True or False: Enabling developer mode on a device always weakens its security.
False
Developer mode can provide advanced configuration settings but should be used cautiously.
What are the symptoms of malware in mobile operating systems?
Symptoms include:
* High number of ads
* Fake security warnings
* Sluggish response time
* Limited/no Internet connectivity
* Unexpected application behavior
* Leaked personal files/data
What is app spoofing?
App spoofing is when a malicious app mimics a legitimate app to deceive users into installing it
This often involves using similar names and fake reviews.
What are bootleg app stores?
Bootleg app stores provide pirated or closely mimicked apps, posing security risks to users
They can lead to malware infections and copyright infringements.
Fill in the blank: A trusted app source is managed by a _______.
[service provider]
What can users do to mitigate unauthorized location tracking?
Users should manage location services and strip geotagging information from images before posting online
This helps protect sensitive information from being exploited.
What should users be cautious of when installing new apps?
Users should be cautious of apps that request permissions unrelated to their function
This is especially important even when using approved app stores.
What might excessive power drain on a device indicate?
Excessive power drain may indicate malware activity, such as cryptomining
Malware can run background processes that consume resources.
What is the risk associated with using third-party app sources on Android?
Using third-party app sources exposes the device to potential malware and untrusted applications
It is crucial to monitor and validate any sideloaded apps.
What is a common indicator of a compromised device?
Leaked personal files/data can indicate a compromised device
Users should be alert to unauthorized access notifications.
True or False: All free apps are likely to be malicious due to high ad levels.
False
High ad levels can be normal for free apps, but unexpected ads may indicate malware.
What should users do if they receive unexpected 2-step verification notifications?
Users should investigate potential unauthorized access to their accounts
This could indicate that their credentials have been compromised.
What is the function of cryptography in enterprise workspaces?
Cryptography protects the workspace and makes it harder to compromise than local agents
It enhances security even when devices are rooted or jailbroken.