Security: Explain common methods for securing mobile and embedded devices. Flashcards

CompTIA A+ 220-1102 Exam Criteria

1
Q

What are the options to secure your mobile device through Screen lock?

A
  • Facial recognition
  • PIN codes
  • Fingerprint
  • Pattern
  • Swipe -No recommended it just locks to lock screen
  • Failed Login Attempts Lockout - You can indefinitely lock out the device or even trigger the device to wipe the device in certain amount of attempts have failed.
    -Multi Factor Authentication
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Where can you find lock screen settings? Why do you need to hide content on lockscreen?

A

ANDROID:

On the Settings screen, scroll down and select Security & location.

On the Security & location screen, double-click Screen lock.

On the Choose screen lock window, double-click Password.

On the Set screen lock screen, enter the following and select Next: Type in password here.

Enter the following on the Re-enter your password window and click Confirm.

Note: Adding a password to the lock screen of the device will ensure that unauthorized users can not access the device if the device is lost or stolen.

On the Notifications screen, select Hide sensitive content and click DONE.

Note: Selecting the Hide sensitive content option will ensure that when the device is locked, it will not display any notifications such as messages or emails on the lock screen, protecting the user’s privacy.

Note: A password was set for the screen lock of the device. There are different options available for the screen lock feature. This includes Swipe where the screen is locked by swiping to the left or the right of the screen to lock the device. This method will not secure the device and only lock or unlock it. The other two options are Pattern or PIN, where the device can be unlocked by a PIN specified by the user or a specific pattern on the device’s lock screen.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the settings to secure my mobile device?

A

ANDROID:

Open - Security & location > Double Click Google Play Protect option.

Note: The Play Protect feature can be used to scan the device for malicious applications, thus protecting the data on the device.

Click the Overview button (square icon) at the bottom of the device. > Select the Security & location screen. > On the Security & location screen, select Security update.

Click the overview button (square icon) at the bottom of the device and select the Security & location screen.

On the Security & location screen, select Location. > On the Location screen, enable the Use location slider

Click the back arrow on the Location screen. > On the Security & location screen, scroll down and select Advanced. > Select Encryption & credentials in the Advanced drop-down menu. >

Click Encrypt tablet on the Encryption & credentials screen.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What other additional Security Settings for a Mobile Device can you consider?

A

Google Protect

Update Security - Note: It is essential to keep the operating system of a mobile device up to date to ensure the latest security patches are installed on the device. If it is not updated regularly, the device will become vulnerable to cyber security threats.

Enable Location - Note: In a real-world scenario, the device’s location will be enabled, which can then be used to determine its location if it is lost or stolen. Enabling this feature will also ensure applications on the device can use the location of the device to enable specific features for the applications.

Encrypt the Device for stronger Security.

Back up (settings > System > Advanced > Samsung

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How can I use the device location to factory reset/Swipe if I lost my phone?

A

Locator Apps/remote wipes (settings > Security & Location)

You can also use samsung web browser to remote wipe or use icloud to remote wipe on apple

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Why would you disable Bluetooth to enhance security?

A

Stops transmitting a constant connection that can be hacked and share your location.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Trusted Sources vs Untrusted sources, what are the considerations?

A

Google play protect can verify legitimate apps which can be trusted. (.apks - Android Package Kit)

Same with apple devices (.ipa for ios App Store Package)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does a developer options do?

A

Systems> About > Build Number (click multiple times to activate developer options) - Open additional options for the phone that is not available by default.

This may present risk as it will open sec vulnerability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

BYOD vs Corporately owned? what are the risks?

A

BYOD: Hard to manage
Corporately Owned: Easier to manage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the purpose of Mobile Device Management?

A

Mobile Device Management (MDM) enables IT admins to securely monitor and manage the mobile devices that access sensitive business data. It includes storing essential information about mobile devices, deciding which apps can be present on the devices, locating devices, and securing devices if lost or stolen.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What other additional Layers can you use to protect your mobile device?

A

You can download a reputable Anti-virus/Anti-Malware program
Use Mobile VPN
Download an Network Firewall application that can manage incoming and outgoing data traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly