Section 3.5 Secure mobile solutions Flashcards

1
Q

What is the standard used primarily in mobile devices to facilitate easy communications between two or more devices simply by bringing them into proximity?

A

Near Field Communication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Because NFC used RFID technology, it is vulnerable to what?

A

Eavesdropping by another device
MITM attacks
Relay attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What kind of attack relays modified information back and forth from the victim’s device, impersonating one of the devices?

A

Relay attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What term refers to one host or station communicating directly with another distinct host allowing them to share data without necessarily traversing the internet and can provide a more secure mechanism to share files between two authorized parties?

A

Point-to-Point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What term means that a host can simultaneously communicate with multiple hosts?

A

Point-to-Multipoint

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What uses radio frequencies to identify and track “tagged” items?

A

RFID

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What concept evolves the MDM concept to include management of all endpoints within a single management interface?

A

Unified Endpoint Management (UEM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What do you call the capability of devices to remotely delete their contents?

A

Remote Wipe

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

If you didn’t want any mobile devices within sensitive areas of your building, like executive conference rooms or secure laboratories, you could use what to implement access control measures?

A

Geofencing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the most common methods of authenticating a user into their devices and preventing unauthorized access to the contents within?

A

Screen Locks, Passwords, and PINs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What do you call small messages sent to a device from a central server, often as alerts or notices?

A

Push notifications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What concept requires different authentications based on the context in which access to a data asset is attempted?

A

Context-Aware Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What concept creates containers within a mobile device that separate different types of data from each another, such as corporate and personal data?

A

Data containerization/Mobile Sandboxing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What concept allows corporate data to be encrypted and only accessible by certain applications and to disable the ability to copy and paste between personal and corporate applications?

A

Data Containerization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What concept allows a remote administrator to remove corporate data selectively from a mobile device in the case of a data leak or other negative event, while not touching personal data?

A

Data Containerization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
A