Lesson 13: Implementing Secure Mobile Solutions Flashcards
A user would like to install an application on a mobile device that is not authorized by the vendor. The user decides the best way to accomplish the install is to perform rooting on the device. Compare methods for obtaining access to conclude which type of device the user has, and what actions the user has taken.
A. The user has an iOS device and has used custom firmware to gain access to the administrator account.
B. The user has an Android device and has used custom firmware to gain access to the administrator account.
C. The user has an iOS device and has booted the device with a patched kernel.
D. The user has an Android device and has booted the device with a patched kernel.
B
Analyze the following scenarios and determine which accurately describes the use of an ad hoc Wi-Fi network.
A. Two or more wireless devices connect to each other on a temporary basis.
B. A smartphone shares its Internet connection with a PC.
C. Mobile device connects with a wireless speaker and keyboard.
D. A smartphone connects to a PC via Bluetooth.
A
Which microwave connection mode is most appropriate for forming a strong connection between two sites?
A. P2P
B. P2M
C. OTA
D. OTG
A
An attacker uses spoofed GPS coordinates on a stolen mobile device, attempting to gain access to an enterprise network. Which statement best describes the attack vector?
A. The attacker uses the spoofed coordinates to defeat containerization on the target network.
B. The attacker uses spoofed coordinates to perform a bluesnarfing attack.
C. The attacker uses spoofed coordinates to establish a rogue wireless access point.
D. The attacker uses spoofed coordinates to defeat geofencing on the target network.
D
Pilots in an Air Force unit utilize government-issued tablet devices loaded with navigational charts and aviation publications, with all other applications disabled. This illustrates which type of mobile device deployment?
A. BYOD
B. COBO
C. COPE
D. CYOD
B
A user facing a tight deadline at work experiences difficulties logging in to a network workstation, so the user activates a smartphone hotspot and connects a personal laptop to save time. Which of the following vulnerabilities has the user potentially created for the enterprise environment?
A. A device in “discoverable” mode can exploit outdated software patches.
B. The device may be vulnerable to a skimming attack.
C. The device may be able to defeat geofencing mechanisms.
D. The device may circumvent data loss prevention and web content filtering policies.
D
An attacker steals personal data from a user device with an outdated Bluetooth authentication mechanism. What type of attack has occurred?
A. Bluejacking
B. Bluesnarfing
C. Bluetooth jamming
D. Jailbreaking
B
Analyze and compare iOS and Android operating systems (OS) to accurately differentiate between the two. (Select all that apply.)
A. Android releases updates often, while iOS is more sporadically released.
B. iOS is limited to Apple products, while Android has multiple hardware vendors.
C. Android is an open source OS based on Linux, unlike iOS, which is a closed and proprietary system.
D. iOS is more vulnerable to attack due to being a closed source, while Android is more secure with multiple partners working to secure the OS.
B,C
Analyze mobile device deployment models to select the best explanation of the Corporate Owned, Personally-Enabled (COPE) deployment model.
A. The employee may use the mobile device to access personal email and social media accounts. The device is chosen and supplied by the company.
B. The employee may use the mobile device to access personal email and social media accounts. The device is chosen and supplied by the employee.
C. The device is the property of the company and may only be used for company business.
D. The employee may use the mobile device to access personal email and social media accounts. The device is chosen by the employee and supplied by the company.
A
The owner of a company asks a network manager to recommend a mobile device deployment model for implementation across the company. The owner states security is the number one priority. Which deployment model should the network manager recommend for implementation?
A. BYOD since the company can restrict the usage to business only applications.
B. CYOD because even though the employee picks the device, the employee only conducts official business on it.
C. COPE since only company business can be conducted on the device.
D. COBO because the company retains the most control over the device and applications.
D