Domain 2.5 Given a scenario, deploy mobile devices securely. Flashcards

1
Q

MDM

A

Mobile Device Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Remote Wipe

A

Remotely wipe a mobile device (Birck the device)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Geofencing

A

Geofencing relies on GPS tracking. It only allows a device to work within a specific physical location.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Geolocation

A

The process or technique of identifying the geographical location of a person or device by information processed via the internet. Time, Date, Long/Lat of where a picture or video was taken.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Push Notification

A

the Notifying service pushes the notification out to your device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Pull Notification

A

Your device must go out and pull a notification in order to receive it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Biometric

A

Something that makes you-you. Fingerprint, Face recognition, iris scanning, retina scanning.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Iris scanning

A

color part of your eye

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

retina

A

back of your eye

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

gait

A

how you walk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

something you have

A

token, CAC, key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Context-Aware Authentication

A

takes into account the context in which the authentication attempt is being made. We all log in differently depending on location, time of day, what device they are logging in from.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Storage Segmentation

A

segmenting a mobile device’s storage to keep work data separate from personal or operating system data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Full DEVICE encryption

A

Encrypting a phone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Side loading

A

When you get an app from someone else and install it on a jail broken/rooted device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

what device can you jailbreak?

A

iPhone

17
Q

What device can your root?

A

Android

18
Q

OTA update

A

Over the Air update. You do not have to plug in the phone

19
Q

SMS

A

simple Text message

20
Q

MMS

A

send a picture, or audio, or to multiple people

21
Q

ad hoc

A

devices connecting to each other to get internet access through each other.

22
Q

hot spot

A

an ad hoc network through a mobile device

23
Q

GPS Tagging/Geotagging

A

adding geolocation data to the metadata to media

24
Q

tethering

A

the process of literally attaching some cable from the mobile device to some immobile structure

25
Q

PCIDSS (on the test they call is PCI)

A

Payment Card Industry Data Security Standard - the transaction using a Credit Card, debit card etc at a POS.

26
Q

BYOD

A

bring your own device - employees bringing their personal devices into the corporate network environment.

27
Q

COPE

A

Company -Owned and Provided Equipment

this can be expensive as the company buys the equipment and provides it to you.

28
Q

CYOD

A

Choose Your Own Device - the company creates a list of approved devices that meet the company’s minimum security standards. The user chooses which they want.

29
Q

Virtual Desktop Infrastructure

A

VDI - your computer is a virtual on a server somewhere. You have a Thin-client at your desk. You connect through that device to your “computer” remotely.

30
Q

A user is using their smart phone to pay for items at the register. What technology is used by the application to make the payment?

A. Bluetooth
B. NFC
C. WiFi
D. Infrared

A

B. NFC

31
Q

What technology provides organization with the best control over BYOD equipment?

A. Encrypted removable storage
B. Application whitelisting
C. Mobile Device Management
D. Geotagging

A

C. Mobile Device Management

32
Q

What is the term used to describe the designation of a specific geographical area that is then used to implement features on a mobile device, which can be determined by GPS coordinates?

A. Bluesmacking
B. Geofencing
C. Banner grabbing
D. Geotagging

A

B. Geofencing

33
Q

Which of the following BEST describes storage segmentation?
A. Separating business from personal data.
B. Separating different mobile devices from each other.
C. Storing back-ups in a separate location.
D. Encrypting sensitive data

A

A. Separating business from personal data.