Lesson 12 - Chapter 2: Securing Mobile Devices Flashcards

1
Q

What do MDM policies combine to deal with mobile devices in the workplace?

A

combine a specialized app on the devices with specialized infrastructure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

In what way do mobile devices have a similar feature to Bitlocker?

A

modern iOS and Android devices use full device encryption to protect the built-in storage
(so even if the phone is dismantled they can’t access your data)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Where do you go on an Apple device to access Find my Device when lost?

A

iCloud > Find my iPhone (works for iPads)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How does find my device work?

A

when the lost device accesses the Internet and receives an IP/MAC address, the service (like iCloud) will pinpoint the location within a few yards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What should you do if your phone is lost or stolen and you have sensitive information like bank details on it?

A

remotely wipe it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How do you access a corporate VPN?

A

may require a specific app approved by the organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Do mobile devices use firewalls? Why or why not?

A

No because they don’t have a lot of services listening on open ports like a regular computer and the cellular and Wi-Fi networks mobile devices use employ their own firewalls to protect networked devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Are there traditional software firewall packages available if you wanted to install one?

A

Yes, depending on the OS.

Android software firewall packages include basic rule elements to filter specific traffic coming to the host

(these work at a very basic level, keep in mind)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly