Mobile Device Security Flashcards

1
Q

Describe these mobile use policies:
1) Bring your own device (BYOD)
2) Choose your own device (CYOD)
3) Corporate Owned, Personally Enabled (COPE)
4) Company Owned, Business Only (COBO)

A

1) When employees bring their personal devices for accessing organizational resources.
2) When employees can select their own devices, approved by the companyy, to access organizational resources.
3) Allows employees to use and manage the devices purchased by the organization.
4) When devices purchased by the organization are used the business purposes only.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Describe the follwoing Mobile Device Management terms:
1) Geolocation
2) Geofencing
3) Full Device Encryption
4) Containerization
5) OTA Updates

A

1) Provide the real-world geographical location when a device is connected to the Internet.
2) A virtual fence that interacts with users at a specific location once they cross the fence.
3) Encrypts all medium within a mobile device.
4) When personal and organizational data is segregated.
5) New method of delivering udpates.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Describe these term:
1) NFC
2) Satcom
3) Cellular communication

A

1) Enables communication between devices up to 10cm.
2) An artificial satellite that provides services across the globe.
3) single network tower that provides services within a certain radius.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Describe these terms:
1) ANT
2) IR

A

1) A wireless sensor protocol that enables communication between sensors and their controllers.
2) Transfers data between two devices up to 5m.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Describe these Mobile Devie Management (MDM) components:
1) Mobile Application Management
2) Mobile Content Management
3) Context-Aware Authentication

A

1) Controls as secures organizational data. Eg; remote wipe, remote activation/deactivation.
2) Safeguards the data on mobile devices.
3) uses geolocation, identity, and behaviour for data security decisions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Describe these Mobile Devie Management (MDM) components:
1) Mobile Enterprise Management
2) Mobile Security Management

A

1) Consists of tools and techniques to secure data on BYOD and organizational devices.
2) Consits of steps and procedures to secure data on mobile devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly