Lesson 9: Supporting Mobile Software Flashcards

1
Q

Mobile device mechanism that locks the screen after a period of inactivity. (activates if the device is unused or if the user presses the power button. The user must perform a gesture to unlock the device.)

A

Screen lock

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

PIN

A

Personal identification number

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Path for Updates for iOS

A

Settings > General > Software Update

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Mobile device authentication mechanism that progressively delays or blocks unlock attempts after multiple failures.

A

failed login attempts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

BYOD

A

Bring your own device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

COPE

A

Corporate owned, personally enabled

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

COBO

A

Corporate owned, business only

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

CYOD

A

Choose your own device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Cloud app that uses mobile device location service to identify its current position on a map and enable security features to mitigate theft or loss. (find the device if it is lost or stolen.)

A

locator application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

MDM

A

Mobile Device Managment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Software that allows deletion of data and settings on a mobile device to be initiated from a remote server.

A

remote wipe

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

You are troubleshooting a user device that keeps powering off unexpectedly. You run hardware diagnostics and confirm there is no component fault or overheating issue. What should your next troubleshooting step be?

A

Check that the device has sufficient spare storage, and check for updates. If you can’t identify a device-wide fault, test to see whether the issue is associated with use of a single app.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Remote-initiated factory reset of a mobile device that removes all user data and settings. (performs a factory default reset and clears all data, apps, and settings.)

A

device wipe

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Remote-initiated wipe of a mobile device that removes corporate apps and data only.

A

enterprise wipe

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

IoT

A

Internet of Things

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Devices that can report state and configuration data and be remotely managed over IP networks. (used to describe the global network of personal devices, home appliances, home control systems, vehicles, and other items that have been equipped with sensors, software, and network connectivity. These features allow these types of objects to communicate and pass data among themselves and other traditional systems such as computer servers.)

A

IoT (Internet of Things

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A company wants to minimize the number of devices and mobile OS versions that it must support but allow use of a device by employees for personal email and social networking. What mobile deployment model is the best fit for these requirements?

A

Corporate owned, personally enabled (COPE) will allow standardization to a single device and OS.

As the requirement does not specify a single device and OS, choose your own device (CYOD) would also fit.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

True or false? Updates are not necessary for iOS devices because the OS is closed source.

A

False.
Closed source just means that the vendor controls development of the OS. It is still subject to updates to fix problems and introduce new features.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What two types of biometric authentication mechanism are supported on smartphones? (2)

A
  • Fingerprint recognition
  • Facial recognition.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

The marketing department has refitted a kitchen area and provisioned several smart appliances for employee use. Should the IT department have been consulted first?

A

Yes.
Uncontrolled deployment of network-enabled devices is referred as shadow IT. The devices could increase the network attack surface and expose it to vulnerabilities. The devices must be deployed in a secure configuration and monitored for security advisories and updates.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Standard routine created by manufacturer that can be invoked to restore an appliance to its shipped state, clearing any user customization, configuration, or modification. (removes all user data, apps, and settings.)

A

factory reset

19
Q

iOS feature for simple file sharing via Bluetooth.

(an iOS feature that allows file transfer between iOS and macOS devices over Bluetooth, Wi-Fi, or cellular connections.)

A

AirDrop

20
Q

Android feature for simple file sharing via Bluetooth.

A

Nearby Share

21
Q

True or false? A factory reset preserves the user’s personal data.

A

False.
Restoring to factory settings means removing all user data and settings.

22
Q

You are updating an internal support knowledge base with advice for troubleshooting mobile devices. What is the first step to take if a user reports that an app will not close?

A

Use force stop if available and/or reboot the device.

23
Q

Gaining superuser level access over an Android-based mobile device.

A

Root access

24
Q

Removes the protective seal and any OS specific restrictions to give users greater control over the device.

A

Jailbreak

25
Q

Mobile device feature designed for testing apps during development that may weaken corporate security protections if misused.

A

developer mode

26
Q

Advanced malware can operate covertly with no easily detectable symptoms that can be obtained by scanning the device itself. What other type of symptom could provide evidence of compromise in this scenario?

A

Leaked data files or personal information such as passwords.

26
Q

Android app package format used when sideloading software from a source other than a trusted store.

A

APK

27
Q

You are assisting with the configuration of MDM software. One concern is to deny access to devices that might be able to run apps that could be used to circumvent the access controls enforced by MDM. What types of configurations are of concern?

A

Devices that are jailbroken or rooted allow the owner account complete control.

Devices that allow installation of apps from untrusted sources, such as by sideloading APK packages or via developer mode, could also have weakened permissions.

27
Q

Software that illegally copies or imitates a commercial product or brand. (one that pirates or very closely mimics a legitimate app.)

A

bootleg app

28
Q

A security manager sets up monitoring mechanisms to detect a rooted or jailbroken device. What type of security mechanism should the manager implement?

A.MDM
B.AV
C.Firewall
D.No-root firewall

A

A. MDM

Mobile-device management (MDM) suites have routines to detect a rooted or jailbroken device or custom firmware with no valid developer code signature and prevent access to an enterprise app, network, or workspace.

The main tool to use to try to remediate an infected system will be antivirus (AV) software, though if the software has not detected the virus in the first place, then it is best to use a different suite.

There are also firewall apps for mobile devices. These can be used to monitor app activity and prevent connections to ports or IP addresses.

“No-root” firewalls work by creating a virtual private network (VPN) and then controlling app access to the VPN.

29
Q

A user reports that a new device is not sustaining a battery charge for more than a couple of hours. What type of malware could this be a symptom of?

A

This is most characteristic of cryptomining malware as that explicitly hijacks the computer resources of a device to perform the intensive calculations required to mine blockchain currency.

30
Q

A user is setting up their company phone and wants the login to be secure. Which of the following authentication methods is generally considered the least secure?

A.Pattern Lock
B.PIN
C.Fingerprint
D.Facial recognition

A

A. Pattern Lock

31
Q

After reading many positive reviews, a user downloads an app that they later found out was malicious to their corporate device. Which of the following was the most likely cause for the user to download the malicious program?

A.Sideloading
B.Root access
C.Missing or renamed files
D.Spoofed app

A

D. Spoofed app

32
Q

A user is experiencing issues on their iPhone. What troubleshooting option should the user initially try?

A.Disable Safe Mode.
B.Perform a power cycle.
C.Perform a Settings/General/Factory reset.
D.Perform a System/Advanced/Factory reset.

A

B. Perform a power cycle

33
Q

A user’s phone is randomly rebooting all the time. What should the user do first to diagnose the issue?

A.Conduct battery diagnostics
B.Determine if inadequate resources exist
C.Conduct changes to autorotate settings
D.Ensure the device is connected to Wi-Fi.

A

A. Conduct battery diagnostics

A device that randomly reboots might be overheating, having a low battery charge, or having a faulty battery or other hardware.

If users can rule out hardware causes, such as throttling due to high temperature or low battery charge, a device that is slow to respond can be an indication of resources being inadequate.

Use the notification drawer or control center to check that the rotation lock is not enabled if a screen is not auto-rotating.

When an update does not download, connect the device to building power and Wi-Fi. An update may be blocked when there is insufficient battery charge or when the device is connected to a metered network.

34
Q

A security manager is looking at mobile security for company devices. They are investigating no-root firewalls and understanding how this works. Which of the following best describes no-root firewalls?

A.Control access locally.
B.Block phishing sites.
C.Control access through a VPN.
D.Block adware.

A

C. Control access through a VPN

“No-root” firewalls work by creating a virtual private network (VPN) and then controlling app access to the virtual private network (VPN).

The “no-root” firewalls do not control access locally because they would need root privileges to do so. It gets around this by setting up a VPN and controlling the firewall through the VPN.

Antivirus/anti-malware apps designed for mobile devices tend to work more like content filters to block access to known phishing sites.

Antivirus/anti-malware apps designed for mobile devices tend to work more like content filters to block adware/spyware activity.

34
Q

A company sets up a mobile device management policy. The company has concerns about the controllability of the devices due to liability, so they are going to purchase the devices for employees to use for business. What is this policy considered?

A.BYOD
B.COBO
C.COPE
D.CYOD

A

B. COBO

Corporate-owned, business only (COBO) means the device is the property of the company and may only be used for company business.

With bring your own device (BYOD), the mobile device is owned by the employee. The mobile will have to meet whatever profile is required by the company.

With corporate-owned, personally enabled (COPE), the device is chosen and supplied by the company and remains its property.

In choose your own device (CYOD), it is similar to COPE but the employee is given a choice of device from a list.

35
Q

A security manager proactively looks for solutions to prevent illegitimate apps from running on corporate iOS devices and stealing credentials. What is the security manager concerned about?

A.App Store
B.Developer tools
C.OS compatibility
D.Overheating

A

B. Developer tools

Under iOS, using the developer tools can be a means of installing apps from outside the App Store without having to jailbreak the device.

The App Store is the official platform for browsing and installing applications. This app can be controlled through device management but tends to offer a safer alternative than sideloading.

If an app fails to update, check that it is compatible with the current operating system (OS) version. Also, verify that there is sufficient storage space and an internet connection.

A device that randomly reboots might be overheating, having a low battery charge, or having a faulty battery or other hardware.

36
Q

A security analyst analyzes how most users perform exploits against iOS operating systems. Which of the following is most applicable?

A.Sideloaded apps
B.While tethered
C.Root access
D.Clear app cache

A

B. While tethered

For most exploits, this can only be done when the device is attached to a computer while it boots (tethered jailbreak).

iOS is more restrictive than Android, so the term “jailbreaking” became popular for exploits that enabled the user to obtain root privileges, sideload apps, change or add carriers, and customize the interface.

Root access is associated with Android devices. Some vendors provide authorized mechanisms for users to access the root account on their device.

Clearing the app cache is part of troubleshooting steps for apps crashing. It can be done either from within the app or (in Android) using the Clear Cache option under App info.

37
Q

A mobile device manager is looking at data encryption and the “Data Protection” setting. Which of the following does this protect?

A.Contacts
B.SMS message
C.Pictures
D.Email data

A

D. Email data

Email data and any apps using the “Data Protection” option are subject to a second round of encryption using a key derived from and protected by the user’s credential.

Not all user data is encrypted using the “Data Protection” option. Contacts are not encrypted. In iOS, Data Protection encryption is enabled automatically when the user configures a passcode lock on the device.

SMS messages are not encrypted under Data Protection settings either. As of Android 10, there is no full disk encryption as it is considered too detrimental to performance.

Pictures are also not encrypted under data protection settings.

38
Q

A user is frustrated that an app crashed after receiving a recent update. What is the first step the user should try?

A.Clear app cache.
B.Reboot.
C.Force stop and relaunch.
D.Check for pending updates.

A

C. Force stop and relaunch

If an app fails to launch, fails to close, or crashes, first use force stop to quit the app and try launching again.

If restarting the service does not work, users can try clearing the app cache either from within the app or (in Android) using the Clear Cache option under App info.

If the app is still unresponsive after restarting the service and clearing the cache, reboot the device.

After the device has been rebooted and the problem persists, use the app store to check whether an update is pending and install it if so.

39
Q

A security analyst sets up a new mobile device management policy and is looking into remote wiping, device wiping, and enterprise wiping. Which of the following will the enterprise wipe erase? (Select all that apply.)

A.Corporate container
B.Personal apps
C.Business accounts
D.Settings

A

A. Corporate container and C. Business account

If the device is enrolled with mobile device management (MDM), an enterprise wipe can be performed against the corporate container only.

An enterprise wipe also removes any corporate accounts and files. If a device is lost with no chance of recovery, it may be necessary to perform some level of remote wipe to protect data and account credentials.

An enterprise wipe leaves personal apps and settings alone. A device wipe performs a factory default reset and clears all data, apps, and settings.

An enterprise wipe also leaves personal settings and files untouched.

40
Q

A user connects their laptop to the company’s wireless access point, but the internet is very slow. A connection to the Wi-Fi with their corporate mobile device is even slower. What should the user try?

A.Check for airplane mode.
B.Check individual radio functions.
C.Move closer to the AP.
D.Reboot the device.

A

C. Move closer to the AP (access point)

On a mobile, be aware that the radio is less powerful than the one on a computer and that a low battery charge will weaken the signal strength. Try moving the device closer to the access point.

Use the notification drawer or Control Center to check that the device is not in airplane mode

The user should also check that an individual radio function has not been disabled.

If airplane mode is not on, the device range has been checked, and individual radio buttons are enabled, then try rebooting the device.

41
Q

NFC

A

near-field communication

42
Q

A user started using near-field communication (NFC) for payments; however, the user is unable to pay using NFC. Which of the following is NOT part of troubleshooting?

A.Unlock.
B.Ensure airplane mode is off.
C.Hold closer and longer to the reader.
D.List in recipient’s authorized list.

A

D. List in recipient’s authorized list

To use Bluetooth, the sender must be listed in the recipient’s contacts list. This is NOT a step in NFC troubleshooting.

A near-field communication (NFC) issue typically manifests when trying to make payments via a contactless card reader. The device must be unlocked to authorize the payment and enable NFC.

Verify that the NFC sensor is supported and enabled for the wallet app and that airplane mode is not active.

One of the troubleshooting steps with NFC issues is to try holding the device closer to the reader and for longer.

42
Q

A security manager puts together a security awareness campaign for mobile devices. Which of the following is least likely to be a symptom of malware?

A.High number of ads
B.Sluggish response time
C.Unexpected Reboots
D.Redirect to spoofed sites

A

C. Unexpected Reboots

A device that randomly reboots might be overheating, having a low battery charge, or having a faulty battery or other hardware.

If ads display in the browser, open pop-ups that are hard to close, or exhibit a high degree of personalization that the user has not authorized, this might indicate some type of tracking or spyware activity.

Malware is likely to try to collect data in the background or perform processing such as crypto mining.

Malware is likely to corrupt the domain name system (DNS) and/or search provider to perform redirection attacks and force users to spoof sites.

43
Q

Lesson 9 Summary

A

You should be able to explain common methods for securing mobile and embedded devices and troubleshoot common and security-related mobile OS and app issues.

Guidelines for Supporting Mobile Software

Follow these guidelines to support mobile OS and app software and security settings:

Establish policies and procedures to support a BYOD or corporate-owned provisioning model and profile security requirements, such as locator apps, remote wipe, device encryption, remote backup, antivirus, and firewalls.
Configure a screen lock with an appropriate authenticated unlock method (PIN, fingerprint, or facial recognition) and failed-attempts restrictions.
Establish policies and procedures to support secure use of Internet of Things (IoT) devices.
Develop a knowledge base to document steps for resolving general mobile OS and app issues (app fails to launch, app fails to close, app crashes, app fails to update, slow to respond, OS fails to update, battery-life issues, randomly reboots, connectivity issues with Bluetooth/Wi-Fi/NFC/AirDrop, and screen does not autorotate).
Develop a knowledge base to document security concerns (APK, developer mode, root access/jailbreak, and bootleg/malicious application spoofing) and steps for resolving mobile-security issues (high network traffic, sluggish response time, data-usage limit notification, limited/no Internet connectivity, high number of ads, fake security warnings, unexpected application behavior, and leaked personal files/data).
Additional practice questions for the topics covered in this lesson are available on the CompTIA Learning Center.