Mobile Device Security Flashcards

1
Q

A user interface element controlling access to a mobile device after the device is powered on is called:

A

Screen lock

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following allows to erase data on a lost or stolen mobile device?

A

Remote wipe

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A mobile device’s built-in functionality enabling the usage of locator applications is known as:

A

GPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following Apple services enables remote mobile device backups?

A

iCloud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

By default, Android and iOS devices allow a limited number of failed login attempts after which the device becomes inaccessible and requires additional steps to unlock it.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following enable(s) biometric authentication on a mobile device? [2]

A
  • Face lock

- Fingerprint lock

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Implementing full device encryption is one of the methods for securing sensitive data on a smartphone. When enabled, this type of encryption works in conjunction with the phone’s screen lock, i.e. to decrypt the phone (which stays encrypted whenever the phone is locked), a user must first unlock the screen. On Android devices, the unlocking methods include entering a PIN, password, or swipe pattern. Apple devices use passcode and biometric fingerprint sensor (a.k.a. Touch ID).

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following examples meets the requirement of multi-factor authentication on a mobile device?

A

Fingerprint scan and password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

An authenticator application is a software that generates additional authentication token (in the form of a random code) used in two-step verification process.

A

true

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The practice of installing mobile apps from untrusted sources (i.e. websites and app stores other than the official marketplaces) is called:

A

Sideloading

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Installing mobile apps from trusted sources (e.g. Apple’s App Store for iOS devices, or Google Play for Android devices) decreases malware-related security risks.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Allowing “Unknown Sources” in Android security settings enables:

A

Sideloading

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following terms refers to removing software restrictions imposed by Apple on its iOS operating system?

A

Jailbreaking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following enables installation of software that is not available through the official Apple App Store?

A

Jailbreaking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the following facilitates the enforcement of mobile device policies and procedures?

A

MDM (mobile device manager)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the name of a policy that allows employees to use private mobile devices for accessing company’s restricted data and applications?

A

BYOD

17
Q

In which of the mobile device deployment models employees can use corporate-owned devices both for work-related tasks and personal use?

A

COPE