Module 5: Mobile, Embedded, & Specialized Device Security Q Flashcards
Which of the following sets consists of only the core features of a mobile or computing device?
Small form factor, mobile operating system, wireless data network interface for internet access, app stores, local non-removable data storage
Small form factor, mobile operating system, wireless data network interface for internet access, app stores, local non-removable data storage, and data synchronization capabilities with a separate computer or remote servers are the core features of mobile devices
Which of the following sets only lists additional features of a mobile device or a computing device?
Global positioning system (GPS), microphone and/or digital camera, wireless cellular connection for voice communications, wireless personal area network interfaces such as Bluetooth or near-field-communications (NFC), removable storage media
Global positioning system (GPS), microphone and/or digital camera, wireless cellular connection for voice communications, wireless personal area network interfaces such as Bluetooth or near-field-communications (NFC), and removable storage media are additional, non-core features of a mobile device
Which of the following mobile device features senses movements that it then uses to ensure the screen is always oriented upright?
Accelerometer
Accelerometers sense movements and vibrations, which are then used to ensure the mobile display image is oriented upright no matter how the device is turned
John has been appointed as a product manager at a large mobile device manufacturing company. He is designing the core features included in their flagship mobile device that will be launched during the holiday shopping season. Which of the following features should he primarily include?
Data synchronization with a remote server or separate device
Data synchronization capabilities with a remote server or a separate computer/mobile device are a core feature of mobile devices
Dan uses his personal laptop for writing the script for an upcoming high-budget, highly anticipated movie. To keep the script private, he decided not to connect his laptop to any network and updated his system with the latest virus definitions and security patches. Which of the following is Dan’s laptop still vulnerable to?
Malicious USB
Dan’s laptop is still vulnerable to a malicious USB. A USB cable can be embedded with a Wi-Fi controller that can receive commands from nearby devices to send malicious commands to the connected mobile device
Peter is a design engineer at a mobile device manufacturing company. He is designing the core components included in their flagship mobile device being launched during year-end 2020. Peter wants to design a tablet component that would detect vibrations and movements and determine the device’s orientation so that the screen image is always displayed upright. Which of the following are materials he should use for developing this component?
Piezoelectric, piezoresistive, and capacitive components
Piezoelectric, piezoresistive and capacitive components are used to build Accelerometers
Walter’s organization is in the beginning stages of a new project. His team is tasked with finding a tool that must have the following features, allowing it to be remotely managed by the organization:
- It must be able to apply default device settings.
- It must be able to approve or quarantine new mobile devices.
- It must be able to configure emails, calendars, contacts, and Wi-Fi profile settings.
- It must be able to detect and restrict jailbroken and rooted devices.
Which tool should Walter’s team suggest, and why?
MDM, because it allows remote management and over the air updates
Mobile device management (MDM) tools allow a device to be managed remotely by an organization. It typically involves a server component that sends management commands to the mobile devices and a client component that runs on the mobile device to receive and implement the management commands. An administrator can then perform over-the-air (OTA) updates or change the configuration on one device, groups of devices, or all devices. It can also perform all the above-mentioned tasks
Which one of the following is the most appropriate explanation of photoplethysmography?
Measuring heart rate by tracking changes in green light absorption, since human blood absorbs green light
Photoplethysmography uses human blood’s absorption of green light to measures heart rate
In which of the following mobile device connectivity methods are transmitters connected through a mobile telecommunication switching office (MTSO) that controls all of the transmitters in the cellular network and serves as the link between the cellular network and the wired telephone world?
Cellular
Many mobile devices rely on cellular telephony for connectivity. A cellular telephony network’s coverage area is divided into hexagon-shaped cells; in a typical city, the cells measure 10 square miles (26 square kilometers). At the center of each cell is a transmitter that mobile devices in the cell use to send and receive signals. The transmitters are connected through a mobile telecommunications switching office (MTSO) that controls all transmitters in the cellular network and serves as the link between the cellular network and the wired telephone world
In which of the following mobile device connectivity methods are light waves used as a communication channel?
Infrared
Instead of using radio frequency (RF) as the communication media, some devices can use infrared light. Infrared light has a longer wavelength than the visible light spectrum
Marcus is an information security architect at a product-based IT firm. He is responsible for developing policies for the most-secure mobile device enterprise-deploying model. The company will decide the level of choice and freedom for employees. Employees are supplied company-chosen and paid-for devices that they can use for both professional and personal activities. This action is performed under which enterprise deployment model?
Corporate-owned, personally enabled (COPE)
In COPE, employees are supplied the device chosen and paid for by the company, but they can also use it for personal activities
Anola is the security administrator in XYZ consulting. She is asked to suggest a deployment method where the data is stored in a completely secure, centralized server and accessed by authorized employees using their own devices. Which deployment should Anola choose?
Virtual desktop infrastructure (VDI)
The virtual desktop infrastructure(VDI) stores sensitive applications and data on a remote server and can be accessed through employee devices. Enterprise can centrally protect and manage the apps and data on the server
Sean is an information security architect at a financial firm. As his first project, he must design and build an efficient, sure-shot, yet cost-effective solution to detect and prevent bank credit card fraud. How should Sean proceed?
Design a solution that keeps track of dates, times, locations of transactions, and geolocation of the authorized cell phone. When a user makes a purchase at a store, the bank can immediately check that the cell phone and the bank card are in the same place. If they are, the purchase is considered legitimate. But if they are not, then the payment is rejected
This solution is based on geolocation to reduce the chances of bank card fraud. Geolocation can also help prevent the rejection of valid purchases. As per a credit card issuer, the design solutions can reduce unnecessary declines by as much as 30 percent
James is a black hat hacker employed as an authorized officer at Apple. He has credentials and signed a non-disclosure agreement to perform advanced penetration testing on the iOS 6.1.6 operating system, and has already gained low-level access to the mobile device using a backdoor. Which of the following actions should James take to design/create his own custom firmware to exploit underlying vulnerabilities and gain a higher level of access to a UNIX shell with root privileges, essentially allowing them to do anything on the device?
Clone and inherit the source code of the open-source software “P0sixspwn”
Users can circumvent built-in installation limitations on their smartphone to download an app from an unofficial third-party app store, which can be used to access the mobile device’s underlying OS and file system with full permissions. This is called jailbreaking. For example, a jailbreak on an Apple iPhone gives users access to a UNIX shell with root privileges, essentially allowing them to do anything on the device. P0sixspwn is an open-source jailbreaking software used to jailbreak iOS 6.1.3-iOS 6.1.6 operating system. This is the most appropriate software James can clone and inherit to build his own custom firmware
Which of the following mobile device enterprise deployment models are implemented so that employees in an organization are offered a suite of security, reliability, and durability choices that the company has already approved?
Choose your own device (CYOD)
In the CYOD model, employees are offered a suite of security, reliability, and durability choices that the company has already approved