8-B Flashcards
What is an app in the context of mobile devices?
An installable program that extends the functionality of the mobile device.
Why must apps be written and compiled for specific mobile operating systems?
Because an app written for Apple iOS cannot be directly installed on Android.
How are iOS apps distributed?
Via Apple’s App Store, which requires submission and approval by Apple.
What is the ‘walled garden model’ in iOS app distribution?
A model designed to prevent the spread of malware or code that could cause faults or crashes.
What programming language is primarily used for developing iOS apps?
Swift.
What IDE is used for developing Android apps?
Android Studio.
Where can Android apps be downloaded from?
Google Play and third-party sites such as Amazon’s app store.
What is the purpose of app permissions on mobile devices?
To grant apps only the privileges specified by the user.
What account is required to set up an iOS device?
An Apple ID.
What type of account is required for Android devices?
A Google Account or a similar vendor account.
What is mobile device synchronization?
Copying data back and forth between different devices.
What are common types of data that users might synchronize?
- Contacts
- Calendar items
- Pictures
- Music
- Video
- Documents
- Apps
- Passwords
What is a contact?
A record with fields for name, address, email address(es), phone numbers, notes, etc.
What format is widely used for exchanging calendar records?
iCalendar format.
What is the main sync issue with media files such as photos?
The amount of space they take up on the device.
How do mobile devices typically connect to email services?
Using autodiscover connection settings provided by the email service.
What is the difference between IMAP and POP3?
- IMAP: Allows viewing and accessing mail from multiple devices.
- POP3: Downloads mail to the device, removing it from the server.
What is TLS in the context of email configuration?
Transport Layer Security, which protects confidential information like account passwords.
What does Enterprise Mobility Management (EMM) aim to do?
Apply security policies to the use of mobile devices and apps in the enterprise.
What are the two main functions of an EMM product suite?
- Mobile Device Management (MDM)
- Mobile Application Management (MAM)
What is the purpose of Mobile Device Management (MDM)?
Set device policies for authentication, feature use, and connectivity.
What is two-factor authentication (2FA)?
A security process that requires two different kinds of credentials to authenticate.
Fill in the blank: An app must be written and compiled for a specific _______.
[mobile operating system].
True or False: Android apps can only be downloaded from the Google Play Store.
False.
Which account is typically linked for verification and recovery on mobile devices?
A cellphone number or alternative email address.
What technology allows a smartphone to interface with a car’s entertainment system?
Apple CarPlay and Android Auto.
What is the primary use of cached passwords on mobile devices?
To securely save passwords for apps and websites.
What is required for two-factor authentication (2FA)?
Two different kinds of credential, such as a fingerprint and a PIN
Alternatively, an authenticator device or app, a trusted email account, or a registered phone number can be used.
What happens after a user authenticates normally in a 2FA process?
An email, text, or phone call notification is generated on the trusted authenticator app or device
This message may include a one-time password code for confirmation.
What is geolocation?
The use of network attributes to identify (or estimate) the physical position of a device
What are the two systems that a mobile device location service can use?
- Global Positioning System (GPS)
- Indoor Positioning System (IPS)
How does the Global Positioning System (GPS) determine a device’s location?
By determining the device’s latitude and longitude based on information received from orbital satellites via a GPS sensor
What does the Indoor Positioning System (IPS) use to determine a device’s location?
Triangulating its proximity to other radio sources, such as cellular radio towers, Wi-Fi access points, and Bluetooth/RFID beacons
Who can access the location service data stored by a mobile device?
Only apps where the user has granted specific permission to use it
What additional sensor might some mobile devices be fitted with for accuracy?
Magnetometer sensor
Why must a vendor account usually be configured on a smartphone?
To enable access to vendor-specific applications and services
What types of data might require mapping between fields when syncing between applications?
User data, application settings, and configuration profiles
How do you configure an autodiscover-enabled email provider on a smartphone?
By entering the email address and password in the email setup settings
What technology can be deployed to prevent policy breaches involving emailing sensitive documents to a smartphone?
Mobile Device Management (MDM) solutions