Section 3.5 Secure mobile solutions Flashcards
What is the standard used primarily in mobile devices to facilitate easy communications between two or more devices simply by bringing them into proximity?
Near Field Communication
Because NFC used RFID technology, it is vulnerable to what?
Eavesdropping by another device
MITM attacks
Relay attacks
What kind of attack relays modified information back and forth from the victim’s device, impersonating one of the devices?
Relay attack
What term refers to one host or station communicating directly with another distinct host allowing them to share data without necessarily traversing the internet and can provide a more secure mechanism to share files between two authorized parties?
Point-to-Point
What term means that a host can simultaneously communicate with multiple hosts?
Point-to-Multipoint
What uses radio frequencies to identify and track “tagged” items?
RFID
What concept evolves the MDM concept to include management of all endpoints within a single management interface?
Unified Endpoint Management (UEM)
What do you call the capability of devices to remotely delete their contents?
Remote Wipe
If you didn’t want any mobile devices within sensitive areas of your building, like executive conference rooms or secure laboratories, you could use what to implement access control measures?
Geofencing
What are the most common methods of authenticating a user into their devices and preventing unauthorized access to the contents within?
Screen Locks, Passwords, and PINs
What do you call small messages sent to a device from a central server, often as alerts or notices?
Push notifications
What concept requires different authentications based on the context in which access to a data asset is attempted?
Context-Aware Authentication
What concept creates containers within a mobile device that separate different types of data from each another, such as corporate and personal data?
Data containerization/Mobile Sandboxing
What concept allows corporate data to be encrypted and only accessible by certain applications and to disable the ability to copy and paste between personal and corporate applications?
Data Containerization
What concept allows a remote administrator to remove corporate data selectively from a mobile device in the case of a data leak or other negative event, while not touching personal data?
Data Containerization