Care And Feeding Of Mobile Devices Flashcards

1
Q

Restarting the device, whether you do it from within the OS or with hardware buttons on the device

A

Soft Reset

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Reduction in power to protect a device’s CPU from heat damage; performance should pick up as the device cools

A

Thermal Throttling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Occurs when too many consecutive login attempts fail, the purpose being to protect the device from brute-force attacks

A

System Lockout

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A string of bits used by a computer program to encrypt or decrypt data

A

Key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A collection of configuration and security settings that an administer has created in order to apply those settings to particular categories of users or devices

A

Profile

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Authentication factor that is something the user knows, such as a user name, password, date of birth, Social Security number, etc.

A

Knowledge Factor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Authentication factor that is something the user has in her possession such as a smart card or token

A

Ownership/Possession Factor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Authentication factor that is something the user either is or something they do like a biometric identifier

A

Inherence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Looks through the permissions requested by your installed apps to assess the risk they pose to security and privacy

A

App Scanner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Technique that involves setting up equipment to spoof a carrier’s tower and infrastructure and cause a cellular device to use it instead of the normal tower equipment. Requires overpowering the nearest legitimate cell signal, causing the cellular device to lock onto it instead

A

Tower Spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The user installs a program on the iOS device that changes settings Apple didn’t intend for users to change. Allows a user to install blocked software, such as apps that don’t come from the App Store or apps that don’t meet Apple’s legal and quality requirements

A

Jailbreaking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

For Android devices, is a similar procedure to grant the full administrative access to the lower-level functionality of the device. Done to install software or enable functions that could not otherwise be used on the device

A

Rooting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly