Mobile Device Security Flashcards
A user interface element controlling access to a mobile device after the device is powered on is called:
Screen lock
Which of the following allows to erase data on a lost or stolen mobile device?
Remote wipe
A mobile device’s built-in functionality enabling the usage of locator applications is known as:
GPS
Which of the following Apple services enables remote mobile device backups?
iCloud
By default, Android and iOS devices allow a limited number of failed login attempts after which the device becomes inaccessible and requires additional steps to unlock it.
True
Which of the following enable(s) biometric authentication on a mobile device? [2]
- Face lock
- Fingerprint lock
Implementing full device encryption is one of the methods for securing sensitive data on a smartphone. When enabled, this type of encryption works in conjunction with the phone’s screen lock, i.e. to decrypt the phone (which stays encrypted whenever the phone is locked), a user must first unlock the screen. On Android devices, the unlocking methods include entering a PIN, password, or swipe pattern. Apple devices use passcode and biometric fingerprint sensor (a.k.a. Touch ID).
True
Which of the following examples meets the requirement of multi-factor authentication on a mobile device?
Fingerprint scan and password
An authenticator application is a software that generates additional authentication token (in the form of a random code) used in two-step verification process.
true
The practice of installing mobile apps from untrusted sources (i.e. websites and app stores other than the official marketplaces) is called:
Sideloading
Installing mobile apps from trusted sources (e.g. Apple’s App Store for iOS devices, or Google Play for Android devices) decreases malware-related security risks.
True
Allowing “Unknown Sources” in Android security settings enables:
Sideloading
Which of the following terms refers to removing software restrictions imposed by Apple on its iOS operating system?
Jailbreaking
Which of the following enables installation of software that is not available through the official Apple App Store?
Jailbreaking
Which of the following facilitates the enforcement of mobile device policies and procedures?
MDM (mobile device manager)