Securing Mobile Devices(Comptia Objective 2.8) Flashcards

1
Q

What are the various types of screen locks on mobile devices?

A
  • Fingerprint(Biometrics)
  • Face Unlock( Don’t trust this)
  • Swipe( Choose a pattern)
  • Passcode( Choose a PIN or add complexity)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

After 10 failed attempts of unlocking the screen lock on an IOS device what happens?

A
  • Everything get’s erased from the device.
  • Sometimes picture is taken by the phone of the person attempting to login to that device with a failed PIN, facelock, fingerprint etc.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What happens after a certain number of failed screen lock access attempts on an android device?

A
  • Device get’s locked and will require a google login to regain access to the device.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What do many devices have to locate them?

A
  • Built-in GPS and location helpers.
  • Will allow you to find your phone on a map
  • Devices can also be controlled from afar and make a sound or display a message.
  • Option also exists to remotely wipe everything from the device.( So at least you know your data is safe)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How does Remote backup work for smart devices?

A
  • Constantly backs up a mobile device wherever it may happen to be and saves to the cloud. (Not a manual process)
  • Allows you to backup without wires( use whatever existing network you’re connected to)
  • Can restore with one click( Restores everything). Just authenticate and wait.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are some benefits of Apples IOS when it comes to Anti-Virus and Anti-Malware?

A
  • Apple IOS is a closed environment, tightly regulated.
  • Malware has to find a vulnerability
  • Only 1st party approved applications can be installed.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How does Android compare to Apple IOS when it comes to dealing with Viruses and Malware?

A
  • Android is a more open operating system. App’s can be installed from anywhere
  • This makes it easier for malware to find it’s way in making running Anti-virus and anti-malware software crucial for mobile devices.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a feature of mobile devices that make them more secure than Desktop Computers or laptops?

A
  • Apps run in a “Sandbox”. They can only access what data you choose to give them access to.
  • This makes mobile devices relatively safe.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

When it comes to patching and OS updates for mobile devices what are some important things to remember?

A
  • All devices need updates( Even mobile devices)
  • This includes Device patches, security updates, operating system updates( New features, bug fixes)
  • Don’t get behind to avoid security problems.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Biometric Authentication should also be implemented along with?

A
  • Multi-factor authentication( More than one factor, password, passcode, swipe pattern etc)
  • Biometrics include Fingerprint, face, iris etc.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is an important thing to remember when it comes to Biometrics as a security method?

A
  • We’re just figuring this out( Biometrics have a long way to go there have been instances of bad guys circumventing the fingerprint swipe login.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What does an Authenticator app do?

A
  • Acts like a physical Pseudo-random token generator and provides a code on screen that only the person with the phone would know and allows access with the correct code.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does a physical token generator do

A
  • Generates a pseudo random code that you can type in in the login process to gain access. Usually connects to a keychain.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Similar to Desktop computers what can you do to prevent loss of data

A
  • Full Device Encryption.
  • In IOS this is enable by default and is decrypted with your device lock password/code.
  • In Android full device encryption can be turned on by going into the settings and turning it ono.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the differences between Trusted and untrusted sources?

A
  • Once malware is on a phone it has a huge amount of access. For this reason you shouldn’t install APK files from an untrusted sources.
  • in IOS all apps are curated by Apple and they analyse every app to ensure they are safe and meet their approval.
  • On Android devices apps can be downloaded from Google Play or sideloaded(Third Party not google) this is where problems can occur as anyone can essentially make an app for android without Google Plays approval. And malware can find itself onto a device.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is an important things to remember when it comes to Mobile devices and Firewalls?

A
  • Most Mobile phones don’t include a firewall. As most activity is outbound not inbound. Typically nothing needs to gain access to the mobile device to operate.
  • However some mobile firewall apps are available, most of which are for android. And none seem to be widely used.
17
Q

What is one environment where you might see mobile devices using a Firewall?

A
  • Enterprise Environments as they can control mobile apps. Firewalls can then allow or disallow access this is to help protect mobile devices on the inside network form mobile devices which are trying to connect externally.
18
Q

What is the name for a mobile device that is used for personal and company purposes?

A
  • a BYOD( Bring Your Own Device). Manage company owned and user owned mobile devices.
19
Q

Due to security concerns with using a personal mobile device for work how can security of these devices be managed?

A
  • Through the Mobile Device Manager( MDM) which will provide a Centralized Management of mobile devices.
  • The MDM allows you to control where and how data is accessed as well as set policies for apps, data, camera etc and control the devices remotely.
  • The MDM can manage things such as access control where you force screen locks, biometrics and PINS on these single user devices.