Mobile Device Flashcards

1
Q

This system can deny network access to non compliant device

A

Network Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Refers to removing all software restrictions from an Apple device. Users can install software from any third party source

A

Jailbreaking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

It is the process of copying an application package in the Application Packet Kit (APK) format to the device and activating it. It allow apps from Unknown Sources, which can significantly weaken security.

A

Sideloading

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

It is the highest level of wireless security and relies on the Advanced Encryption Standards for its encryption algorithm AKA AES.

A

Wifi Protected Access 2 ( WPA2)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

SMS link bait

A

Pretexting scam

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

This allows two phones to utilize the same service andallows an attacker to gain access to the phones data.

A

SIM Cloning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Unsolicited Message to your bluetooth

A

Bluejacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Unatuhorized access of information from a wireless device over bluetooth

A

Bluesnarfing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Smartphone and many tablets include the ability to connect to a cellular network such as 3G, long term evolution (LTE ) 4G or 4G LTE. It is dependent to your cellular provider

A

Cellular

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Mobile device almost always have a wireless network interface that you can connect to a wireless network. Wireless network require you to enter or select the SSID and enter preshared key or password to access net work

A

Wi-Fi

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

It is a wireless protocol commonly used with a personal area network

A

Bluetooth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

It is commonly used as a payment gateway allowing you to make payments simply by waving your phone in front of an nfc reader.

A

NFC Near Field Communication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A propriety wireless protocol used by some mobile device. Many sports and fitness sensors collect data to a mobile device application

A

ANT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

It is a line of sight wireless technology. It is use as a universal remote for their equipment

A

Infrared

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Mobile devices can typically be connected to a desktop PC or laptop via usb cable

A

USB Universal serial bus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Adds geographical Information to file such as pictures when posting them to social media websites

A

GPS tagging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A form of wireless communication that incorporates to use a electromagnetic or electrostatic coupling in the radio frequency portion of the electromagnetic spectrum can you play identify an object animal or person

A

RFID Radio Frequency Idenification

18
Q

In Wi-Fi networking a wireless bridge let users wirelessly connect two or more locations together. Dispersion able to use her to share an Internet connection between two or more locations to Share files and other types of their across the network

A

Point to Point

19
Q

It is a communication which is accomplished via distinct type of one to many connection providing multiple as of single location to multiplication

A

Point to multi pont

20
Q

MDM tools Can restrict what applications can run on mobile devices. They often use application whitelist to control the applications and prevent unapprove applications from being installed.

A

Application management

21
Q

Tools to help ensure that devices meet minimum security requirements. They can monitor devices enforce security policies and block network access If device do not need this requirements

A

Mobile Device Management

22
Q

Mobile device are owned by the organization but employees can use them for personal reasons

A

COPE corporate-owned personally enabled

23
Q

Allows employess to connect their mobile devices to the organization’s network

A

BYOD Bring your own device

24
Q

Cable allows you to connect mobile device

A

Universal serial bus on the go USB OTG

25
Q

Allows one mobile device to share its Internet connection with other devices.

A

Tethering

26
Q

Uses global positioning system to identify device location

A

Geolocation

27
Q

Uses GPS to create a virtual fence or geographic boundary.

A

Geofencing

28
Q

The organization purchases devices And issues them to employees

A

Corporate Owned

29
Q

After creating segmented storage spaces, it was important to enusre that appropriate content is stored there. An MDM system can ensure that all content retrieved organization source is stored in an encrypted segment. It forces the user to authenticate again when accessing data within this encrypted segment

A

Content management

30
Q

MDM System typically support password policies similar to the password policies use desktop system.

A

Passwords and PINs

31
Q

It is one of the authentication factors ( something you are) for mobile device authentication.

A

Biometrics

32
Q

It sends a remote signal to the device to wipe or erase all data. This also delete any cached data such as cached online banking passwords And provides a complete sanitation of device by removing all valuable data

A

Remote wipe

33
Q

Protects against loss of confidentiality On multiple platforms including workstations servers mobile devices and data transmissions. Also provide device security application security and data security.

A

Full device Encryption

34
Q

Creating a clear separation between personal and company data on a single device

A

Storage segmentation

35
Q

Can prevent application from being installed on the device

A

MDM

36
Q

Uses more elements to authenticate a user and mobile device. It can include the users identity geolocation,verification that the device is within a geofence, Time of day and type of device to help prevent unauthorize users from accessing apps or data

A

Context aware authentication

37
Q

Can also be implemented in mobile devices by running an application in a container, it isolates the application including off its data. It’s possible to encrypt a container to WhatsApp it without encrypting the entire device.

A

Containerization

38
Q

To remind user of security settings or to let them know if their device is complying policy requirements

A

Push Notification services

39
Q

It is a Standard that allows devices to connect without a wireless access point or wireless router this is similar to a wireless ad hoc network

A

Wi-Fi direct

40
Q

It is software that secures and enables IT control
over enterprise applications on end users’ corporate and personal smartphones and
tablets. This software allows IT administrators to apply and enforce corporate policies on
mobile apps and limit the sharing of corporate data among apps.

A

Mobile application management (MAM)