Chapter 21 terms and topics Flashcards
Policy that allows employees in an organization to use their personally owned devices for work-related activities.
BYOD
An employee provisioning model that allows employees to select a mobile device from a limited number of options.
CYOD
Deployment model, employees are supplied a mobile device that is chosen and paid for by the organization, but are given permission to use it for personal activities.
COPE
Company supplies employees with a mobile device that is restricted to company-only-use.
COBO
Security feature that allows a network admin or device owner to send a command that remotely deletes data from a computing device.
Remote Wiping
Security feature that locks up the device after a certain period of time of inactivity.
Remote Locking
The method of installing, updating, and managing the applications through a system.
Application Management
Original USB Speed is
480 Mbps
USB 3 speed is
5 Gbps
USB 3.1 speed is
10 Gbps
USB 3.2 speed is
20 Gbps
USB 4 speed is
40 Gbps
A marketing term for a collective set of commonly employed protection elements associated with mobile devices.
MDM
What six items should an MDM policy contain?
Device locking, Encryption, automatic device locking after inactivity period, remote lock, remote wipe, and device wipe after certain failed login attempts.
Power-conserving variant of PAN technology.
Bluetooth Smart
When a hacker intercepts, deletes, or modifies data that is transmitted between two devices.
Eavesdropping Attack.
A man-in-the-middle attack that occurs when a bad actor intercepts a secure network communication and fraudulently delays or resends it to misdirect the receiver into doing what the hacker wants.
Replay Attack
Four different types of attacks that can be performed against RFID systems, not including replay or eavesdropping attacks.
Attacks against Chips and Readers.
Communication channel attack between the device and the reader.
Attack against the reader and back-end system.
And Radio Frequencies attacks.
The use of GPS and/or RFID technology to create a virtual fence around a particular location.
Geofencing
Using GPS to track a device’s location.
Geolocation
Using geographic coordinates to media based on the location of a mobile device.
Geotagging
What are the advantages and disadvantages of Bluetooth 5?
Uses a different frequency spectrum, requiring new hardware and limiting backward compatibility, but it is designed for local networks of the future with low power consumption, inexpensive hardware and callable data rates versus range considerations.
What types of devices support sideloading?
Only Android mobile devices.
What is a disadvantage of using cellular communication
Gaps in cellular service still exist.
Virtual Technology that creates and manages virtual desktop environments on a centralized server.
VDI
What technologies use point-to-point?
Bluetooth and USB
What technologies use Point-to-multipoint?
Radio based and networked systems.
What types of systems use NFC?
Smart phones, and mobile pay systems.
What USB connector is reversible?
USB-C.
What is the purpose of UEM?
To extend the function set from MDM to encompass all endpoint devices.
Dividing the device into a series of containers-one container holding work-related materials, the other personal.
Containerization
Separates personal and work data but represents a logical separate of the storage in the unit.
Storage Segmentation
What frequency band is used by Bluetooth?
2.4 GHz
What are the modes used by Bluetooth 4.0?
Classic, high-speed, and Low Energy.
What frequency bands are used by Wi-Fi?
2.4 and 5-GHz.
What frequency band is used by GPS?
6-GHz
The use of contextual information to make the authentication decision as to whether to permit the user access to the requested resource.
Context-aware authentication
Text only message service between mobile devices.
SMS
Standard way to send messages that include multimedia content to and from mobile devices.
MMS
Operates between mobile device and the carrier and requires compatible apps on both ends of the communication.
RCS
How to disable Autorun on a Windows 10 computer:
Go to Start, then Settings, Devices, Turn off Auto play.
The process of programming the device to sever itself from the carrier.
Carrier Unlocking
Are biometrics a good security method for mobile devices
No, cause facial and print scanning can easily be bypassed.
What version of Bluetooth is practically extinct
Bluetooth 1 series.
What is the purpose of push notification services?
To deliver information to mobile devices without a specific request from the device.
An extension of USB technology that allows direct connection of mobile devices to other host-based platforms.
USB OTG
A device process by which OS controls are bypassed, and this is the term frequently used for Android devices.
Rooting
A process by which the user escalates their privilege level, bypassing the operating system’s controls and limitations.
Jailbreaking
A security solution for Android that identifies and addresses critical gaps in security.
SEAndroid
The encryption of all data on a disk drive.
FDE
What is the difference between Wi-Fi Ad Hoc and Wi-Fi Direct?
In an Ad Hoc network, multiple devices can communicate with each other, and other devices as well. Direct is where two Wi-Fi devices connect to each other via single hop connection.
What is the purpose of tethering?
Sharing network access.
Set of actions used to control content issues, including what content is available and to what apps, on mobile devices.
Content Management
How is IR technology used? What are its disadvantages?
It’s used in remote control devices, and wireless devices that exchange data through IR. Its signal speed is slow and solid objects can block IR signals to the receiver.
A software that enables IT administrators to manage and secure enterprise applications on end-user smartphones and tablets.
MAM
A hardware security module that allows you a portable means of secure storage for a wide range of cryptographic keys.
MicroSD HSM
What is the purpose of USB OTG?
To have a wireless connection through a USB enabled device.
Why are gesture-based- swipes not considered secure?
Because the screen of the mobile device can show the patterns from the user’s fingerprints.