Mobile Device Security Flashcards

1
Q

Used by mobile devices to make a connection to high-speed Internet

A

Wi-Fi

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Used by mobile devices to connect peripherals to the device, such as wireless headphones, wireless mice, wireless keyboards, etc.

A

Bluetooth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Normally 4-8 digits long, depending on your smartphone or device

A

PIN Code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The screen shows you nine different dots for you to swipe and make a pattern with

A

Pattern

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Malware that can come to you through SMS

A

Pre-texting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Requires a PIN or a password before someone can use the device

A

Remote Lock

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Allows to remotely erase the contents of the device to ensure that no information can be recovered

A

Remote Wipe

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

TLS

A

Transport Layer Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Centralized software solution that allows system administrators to create and enforce policies across its mobile devices

A

Mobile Device Management (MDM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Embedding of the geolocation coordinates into a piece of data, such as a photo or video

A

Geotagging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Four common models of business devices

A

1) COBO
2) COPE
3) CYOD
4) BYOD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Purchased by the company and only used by the employee for work-related purposes

A

COBO (Cooperate Owner/ Business Only)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Company provides a device used for work and/or personal use by employees

A

COPE (Corporate Owned/ Personally Enabled)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Allows employees to choose a device from an approved list of vendors or devices

A

CYOD (Choose Your Own Device)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Allows employees to bring their own devices, and connect to the corporate network

A

BYOD (Bring Your Own Device)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Creates a clear separation between work and personal data on a device

A

Storage Segmentation

17
Q

Centralized software solution for remote administration and configuration of mobile devices

A

Mobile Device Management (MDM)

18
Q

Hardening Mobile Devices (5)

A

1) Update your device to the latest software
2) Install Antivirus
3) Train users on proper security and use of their device
4) Only install apps from the official app stores
5) Do not jailbreak or root your devices
6) Only use Version 2 SIM cards for your devices
7) Turn off all unnecessary features on your device
8) Turn on encryption for voice and data
9) Use strong passwords or biometrics
10) Don’t deploy BYOD

19
Q

Which of the following types of screen locks uses a secret pattern drawn on the screen to prevent access to a mobile device?

a) Swipe
b) FaceID
c) Passcode
d) TouchID

A

a) Swipe

20
Q

Fail to Pass Solutions has requested that its employees have a mobile device so that they can respond to questions when they are out of the office. Each employee is responsible for buying their Android smartphone and cellular plan service. To access the corporate network and its data, the employees need to install a company-provided APK on their device. This app contains access to their company-provided email, cloud storage, and customer relationship management (CRM) database. Which of the following policies BEST describes Fail to Pass’s mobile device deployment model?

a) COBO
b) BYOD
c) COPE
d) CYOD

A

b) BYOD

21
Q

A business owner’s smartphone contains a lot of her customer’s PII. Unfortunately, the business owner refuses to set up the phone to automatically wipe the data if the phone is lost or stolen because the data is precious. Based on the business owner’s refusal to allow automatic wiping of the data, which of the following is the next BEST method of securing the phone?

a) Enable a PIN lock on the device
b) Enable swipe lock on the device
c) Enable fingerprint lock on the device
d) Enable a passcode lock on the device

A

c) Enable fingerprint lock on the device