Chapter 9 Enterprise Mobility and Endpoint Security Flashcards

1
Q

Some executives from an organization attend an industry conference. Using mobile devices and wireless headsets, they are able to stay in touch with colleagues back at the workplace. What may present a security concern in this situation?

A. Tethering
B. WPA3
C. Device Certificates
D. Bluetooth

A

D. Bluetooth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Some marketing executives from an organization attend an international trade exhibition and must connect to the company email by using their mobile devices during the event. The CISO is concerned this may represent a risk. What would best mitigate this risk?

A. NFC
B. A split tunnel VPN
C. Geofencing
D. Always on VPN Settings

A

D. Always on VPN Settings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What function should be disabled to ensure scientists cannot use their mobile devices to bridge the corporations network with a cellular operators network?

A. Tethering
B. WPA3
C. Device Certificates
D. Bluetooth

A

A. Tethering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What should be implemented to ensure only company approved applications can be installed on company devices?

A. Containerization
B. Token based access
C. A patch repository
D. Whitelisting

A

D. Whitelisting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A user calls the service desk because her Samsung smart phone is prompting her to install updates that the vendor says will offer more functionality and security. What is this an example of?

A. MFA requirements
B. Token based access
C. A patch repo
D. Firmware over the air

A

D. Firmware over the air

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

An employee’s company mobile device is reported as stolen 24 hours after the event. Sensitive data has been posted online by hackers. What would have mitigated this risk if the report had been made earlier?

A. MFA requirements
B. A remote wipe
C. A patch repo
D. Firmware over the air

A

B. A remote wipe

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What type of setting will ensure mobile devices will only be able to access WiFi when they connect securely to the company WLAN?

A. WPA3 SAE
B. Device certificates
C. Device profiles
D. Bluetooth

A

C. Device profiles

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

An employee has noticed several suspicious payments made from a company debit card via Google Pay on their company smartphone. They recently attended a busy trade conference.. What technology was likely used to make the payments?

A. NFC
B. Peripherals
C. Geofencing
D. VPN settings

A

A. NFC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How can we prevent certain mobile applications from being accessible when employees take COPE devices out of the warehouse?

A. NFC
B. MFA
C. Geofencing
D. VPN settings

A

C. Geofencing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The service desk receives a call from a senior manager. She is concerned that spyware may be installed on her smartphone. Recent news, traffic, and weather updates have been targeted specifically for her location. What is the most likely reason for this activity?

A. Airplane mode
B. Location services
C. NFC
D. Geofencing

A

B. Location services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A user is concerned that DNS lookups may be logged by government agencies. The user would like to protect their privacy. What would be the best method to protect privacy during name resolution?

A. Geofencing
B. VPN Settings
C. DNS over HTTPS (DoH)
D. Containerization

A

C. DNS over HTTPS (DoH)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A nation state sends a security team to scope out a military site in California in the United States. They use mobile devices to gather images, map the locations of communications equipment and record detailed information about troop movements. What are they performing?

A. Geotagging
B. Geofencing
C. Physical recon
D. Personal data theft

A

C. Physical recon

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A personal device has many applications installed that are not available through the Apple App Store. The device subsequently fails compliance checks. What has likely made the device fail to be compliant with the security policies?

A. Jailbreaking
B. Sideloading
C. Containerization
D. An unauthorized application store

A

A. Jailbreaking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A senior employee has followed a QC link and installed a mobile application used to order food and beverages at a local restaurant. The application is not available on the Google play store. Acceptable use policy states that applications can only be downloaded from the official vendor store. What best describes what has allowed this application to be installed?

A. Supply chain issues
B. Sideloading
C. Containerization
D. An unauthorized application store

A

D. An unauthorized application store

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Developers need to test mobile applications on a variety of hardware before making them available on official application stores. How can they install the applications locally on mobile devices?

A. Update the supply chain
B. Use sideloading
C. Use containerization
D. Use an unauthorized application store

A

B. Use sideloading

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A sales director would like to allow sales employees to use their personal devices for accessing company applications and data as part of an effort to reduce business costs. What would be the best control to mitigate the risk of employees co mingling personal and company data?

A. Geotagging
B. Geofencing
C. Containerization
D. Remote wipes

A

C. Containerization

17
Q

When on a business trip, a CEO was detained for several hours at border control. When he was eventually reunited with his mobile phone, it had physical evidence of tampering. He powered on the device and input the correct pin, but found that all of the company applications and data were inaccessible.. What has led to this situation?

A. Geofencing
B. Containerization
C. Remote wipes
D. eFuse

A

D. eFuse

18
Q

A user has been able to run an unmanaged Linux operating system alongside a managed Windows 10 build on a company laptop. What actions would allow security professionals to prevent this issue from reoccurring?

A. Removing end of support devices
B. Using local drive encryption
C. Disabling CPU virtualization support
D. Enforcing secure encrypted enclaves and SME

A

C. Disabling CPU virtualization support

19
Q

Security administrators have deployed SELinux in enforcing mode. All unnecessary services have been removed. In a further attempt to enforce security, a number of commands including vmstat and grep have been blocked from some user accounts. What best describes this action?

A. Whitelisting
B. Shell restrictions
C. ASLR
D. Memory Encryption

A

B. Shell restrictions

20
Q

The CISO is meeting with software engineers to better understand some of the challenges that they face. He is asking if there are any setting that can be incorporated into build images that will help to prevent attacks against the system memory. What two features should be chosen?

A. ASLR
B. Patching
C. Firmware
D. NX/XN

A

A. ASLR
D. NX/XN

21
Q

What is deployed to mitigate the risk of privilege elevation and the misuse of applications on Android mobile devices?

A. SELinux
B. TPM Technology
C. SEAndroid
D. Attestation services

A

C. SEAndroid

22
Q

What build in module stores PCR values and enforces integrity on a hardware platform?

A. The TPM module
B. Secure Boot Mode
C. UEFI
D. The BIOS

A

A. The TPM module

23
Q

What would be the best choice of technical control to block a fast spreading worm that targets a well known NetBIOS port?

A. UEBA
B. A host based firewall
C. A HIDS
D. Redundant hardware

A

B. A host based firewall

24
Q

A reporting tool has alerted the administrator that Joe who is leaving the company in 4 weeks has uploaded a large number of PDF document to his personal cloud storage. What has likely triggered this event?

A. UEBA
B. A host based firewall
C. EDR Software
D. Self healing hardware

A

A. UEBA