Domain 2.5 Given a scenario, deploy mobile devices securely. Flashcards
MDM
Mobile Device Management
Remote Wipe
Remotely wipe a mobile device (Birck the device)
Geofencing
Geofencing relies on GPS tracking. It only allows a device to work within a specific physical location.
Geolocation
The process or technique of identifying the geographical location of a person or device by information processed via the internet. Time, Date, Long/Lat of where a picture or video was taken.
Push Notification
the Notifying service pushes the notification out to your device
Pull Notification
Your device must go out and pull a notification in order to receive it.
Biometric
Something that makes you-you. Fingerprint, Face recognition, iris scanning, retina scanning.
Iris scanning
color part of your eye
retina
back of your eye
gait
how you walk
something you have
token, CAC, key
Context-Aware Authentication
takes into account the context in which the authentication attempt is being made. We all log in differently depending on location, time of day, what device they are logging in from.
Storage Segmentation
segmenting a mobile device’s storage to keep work data separate from personal or operating system data.
Full DEVICE encryption
Encrypting a phone
Side loading
When you get an app from someone else and install it on a jail broken/rooted device.
what device can you jailbreak?
iPhone
What device can your root?
Android
OTA update
Over the Air update. You do not have to plug in the phone
SMS
simple Text message
MMS
send a picture, or audio, or to multiple people
ad hoc
devices connecting to each other to get internet access through each other.
hot spot
an ad hoc network through a mobile device
GPS Tagging/Geotagging
adding geolocation data to the metadata to media
tethering
the process of literally attaching some cable from the mobile device to some immobile structure
PCIDSS (on the test they call is PCI)
Payment Card Industry Data Security Standard - the transaction using a Credit Card, debit card etc at a POS.
BYOD
bring your own device - employees bringing their personal devices into the corporate network environment.
COPE
Company -Owned and Provided Equipment
this can be expensive as the company buys the equipment and provides it to you.
CYOD
Choose Your Own Device - the company creates a list of approved devices that meet the company’s minimum security standards. The user chooses which they want.
Virtual Desktop Infrastructure
VDI - your computer is a virtual on a server somewhere. You have a Thin-client at your desk. You connect through that device to your “computer” remotely.
A user is using their smart phone to pay for items at the register. What technology is used by the application to make the payment?
A. Bluetooth
B. NFC
C. WiFi
D. Infrared
B. NFC
What technology provides organization with the best control over BYOD equipment?
A. Encrypted removable storage
B. Application whitelisting
C. Mobile Device Management
D. Geotagging
C. Mobile Device Management
What is the term used to describe the designation of a specific geographical area that is then used to implement features on a mobile device, which can be determined by GPS coordinates?
A. Bluesmacking
B. Geofencing
C. Banner grabbing
D. Geotagging
B. Geofencing
Which of the following BEST describes storage segmentation?
A. Separating business from personal data.
B. Separating different mobile devices from each other.
C. Storing back-ups in a separate location.
D. Encrypting sensitive data
A. Separating business from personal data.