Lesson 9: Supporting Mobile Software Flashcards
Mobile device mechanism that locks the screen after a period of inactivity. (activates if the device is unused or if the user presses the power button. The user must perform a gesture to unlock the device.)
Screen lock
PIN
Personal identification number
Path for Updates for iOS
Settings > General > Software Update
Mobile device authentication mechanism that progressively delays or blocks unlock attempts after multiple failures.
failed login attempts
BYOD
Bring your own device
COPE
Corporate owned, personally enabled
COBO
Corporate owned, business only
CYOD
Choose your own device
Cloud app that uses mobile device location service to identify its current position on a map and enable security features to mitigate theft or loss. (find the device if it is lost or stolen.)
locator application
MDM
Mobile Device Managment
Software that allows deletion of data and settings on a mobile device to be initiated from a remote server.
remote wipe
You are troubleshooting a user device that keeps powering off unexpectedly. You run hardware diagnostics and confirm there is no component fault or overheating issue. What should your next troubleshooting step be?
Check that the device has sufficient spare storage, and check for updates. If you can’t identify a device-wide fault, test to see whether the issue is associated with use of a single app.
Remote-initiated factory reset of a mobile device that removes all user data and settings. (performs a factory default reset and clears all data, apps, and settings.)
device wipe
Remote-initiated wipe of a mobile device that removes corporate apps and data only.
enterprise wipe
IoT
Internet of Things
Devices that can report state and configuration data and be remotely managed over IP networks. (used to describe the global network of personal devices, home appliances, home control systems, vehicles, and other items that have been equipped with sensors, software, and network connectivity. These features allow these types of objects to communicate and pass data among themselves and other traditional systems such as computer servers.)
IoT (Internet of Things
A company wants to minimize the number of devices and mobile OS versions that it must support but allow use of a device by employees for personal email and social networking. What mobile deployment model is the best fit for these requirements?
Corporate owned, personally enabled (COPE) will allow standardization to a single device and OS.
As the requirement does not specify a single device and OS, choose your own device (CYOD) would also fit.
True or false? Updates are not necessary for iOS devices because the OS is closed source.
False.
Closed source just means that the vendor controls development of the OS. It is still subject to updates to fix problems and introduce new features.
What two types of biometric authentication mechanism are supported on smartphones? (2)
- Fingerprint recognition
- Facial recognition.
The marketing department has refitted a kitchen area and provisioned several smart appliances for employee use. Should the IT department have been consulted first?
Yes.
Uncontrolled deployment of network-enabled devices is referred as shadow IT. The devices could increase the network attack surface and expose it to vulnerabilities. The devices must be deployed in a secure configuration and monitored for security advisories and updates.