3.5 Implement secure mobile solutions Flashcards

1
Q

Mobile device mgt: what is MDM ?

A

Mobile Device Management is used to centralized management of the mobile devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Mobile device mgt: why MDM is important ?

A

For security (data, network)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Mobile device mgt: what is BYOD in MDM ?

A

Bring Your Own Device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Mobile device mgt: how MDM ensure devices are protected ?

A

By setting up policies on apps, data, camera etc. The admin can control the remote device and manages access control (force scren locks & PIN on a device)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Mobile device mgt: what can you manage if you use an MDM ?

A
  • Application mgt
  • Content mgt
  • Remote wipe
  • Geolocation
  • Geofencing
  • Screen lock
  • Push notification services
  • Passwords & PIN (reset)
  • Biometrics (type, allow/ disallow)
  • Context-aware authentication
  • Containerization
  • FDE
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Mobile device mgt: why is content mgt is important ?

A

It aims at secure access to data and protect them from outsiders.
Ex: restrict file sharing and viewing, set up DLP, encrypt data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Mobile device mgt: what is remote wipe functionnality ?

A

Remove all data from a mobile device (in case of lost/stolen for ex)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Mobile device mgt: what is geofencing ?

A

Restrict or allow features when the device is in a particular area (for ex camera, auth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Mobile device mgt: what is push notification services and why is included in MDM?

A

Notification that appears on the mobile device screen.
Notification display can be controlled in the MDM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Mobile device mgt: what is context-aware authentication?

A

Combine multiple contexts (IP location, GPS location etc) to know if it’s really you trying to auth or if it’s a hacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Mobile device mgt: what is containerization in MDM ?

A

Create separate partitions to keep private information in one partition and company information in another

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Mobile device mgt: what is FDE in MDM and what is the problem w/ FDE?

A

Full Device Encryption
It use a lot of CPU cycles + complex integration between hardware and software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Mobile device security: what is a HSM?

A

Hardware Security Module provides cryptographic features for computer and mobile devices (in a microSD HSM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Mobile device security: what does a microSD HSM (& HSM) provide?

A

Security services & secure storage:
- Encryption
- Key generation
- Digital signatures
- Authentication
- Protect private keys
- Cryptocurrency storage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Mobile device security: what is a UEM ?

A

Unified Endpoint Management is an evolution of MDM allowing the users to use different types of devices
Ex: application can be used across != platforms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Mobile device security: what is a MAM ?

A

Mobile Application Management is used to provision, update, and remove apps

Ex: apps catalog, monitoring of apps use etc

17
Q

Mobile device security: what is a SEAndroid ?

A

Security Enhancements for Androids supports access control security policies and use the SELinux in Android OS

Ex: protect access to kernel

18
Q

Mobile device enforcement: what is rooting/ jailbreaking?

A

Jailbreaking or rooting means removing software restrictions that are intentionally put in place by the device manufacturer.
Android = rooting
iOS = jailbreaking

19
Q

Mobile device enforcement: how to rooting/ jailbreaking?

A

By installing a custom firmware that replaces the existing OS with one that allow you access to the OS itself

20
Q

Mobile device enforcement: why the staff do rooting/ jailbreaking?

A
  • Circumvent security features, sideload apps without using an app store
  • To be able install certains apps that are not allowed by the company
21
Q

Mobile device enforcement: can MDM manage camera and microphone recording?

A

Yes it can disable it

22
Q

Mobile device enforcement: can MDM manage SMS/MMS ?

A

Yes it can disable it completely or disable it in certain area

23
Q

Mobile device enforcement: what is USB OTG ?

A

USB On-The-Go connect mobile directly together The mobile device can be both a host and a device and can be use to read from an external device, act as a storage device

24
Q

Mobile deployment models: what are the != deployment models ?

A
  • BYOD
  • COPE
  • CYOD
  • Corporate owned (device cannot be used for personnal use)
  • VDI/VMI
25
Q

Mobile deployment models: what is COPE ?

A

Corporate owned, personally enabled: company buys the device and users used as both a corporate device and personal device

26
Q

Mobile deployment models: what is CYOD ?

A

Choose Your Own Device: the user choose the device and the corporate buy it for you

27
Q

Mobile deployment models: what is VDI/ VMI ?

A

Virtual Desktop Infrastructure / Virtual Mobile Infrastructure: the apps & data are separated from the mobile device