Software and Troubleshooting: troubleshoot common mobile OS and application security issues Flashcards

CompTIA A+ 220-1102 Exam Criteria

1
Q

What happens when an unauthorized account access?

A

Unauthorized account access – This occurs when settings are changed or purchases made that you did not initiate. If this occurs, you should immediately change your account password. Always monitor your account activity, and make sure that the appropriate alerts are configured for all account activity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What happens when unauthorized root access happens?

A

Unauthorized root access usually results in settings changes that are not normally under regular user control. Make sure to keep your device up to date with the latest patches and upgrades to mitigate this risk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What happens when Unauthorized location tracking happens?

A

Unauthorized location tracking – Location services allows apps to use query your device’s location. On Apple devices, go into Settings > Privacy > Location Services and customize each app’s location services settings. By default, most devices have the location services feature turned off.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What happens when Unauthorized camera/microphone activation?

A

Unauthorized camera/microphone activation – The camera and microphone can be remotely activated by a hacker, allowing them to spy on you when apps are open. Turn off your camera when not in use to provide the highest level of security. To take it one step further, you can cover cameras and microphones to keep them being remotely accessed. Leaked personal files/data can result from these security issues.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What can you do when you have sluggish response times?

A

A sluggish mobile device can indicate several problems, such as outdated OS, low memory, or malware. If a mobile device is beginning to slow down and disrupt productivity, users should clear their device cache, remove any unwanted applications, update the operating system, and scan the device for malware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What happens when Data-usage limit notifications are frequently showing on the mobile device?

A

Mobile devices often have a maximum amount of data that they can use a month, and will alert a user when that maximum is being reached. If these alerts are frequent and are not in line with a user’s behavior, it may indicate malware is running on the device, causing it to use more bandwidth than normal.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the indications that causes fake security warnings?

A

Fake security warnings: Mobile devices can sometimes send fake spam messages stating that the device has been infected with malware and users need to react quickly. These messages are a social engineering attack that will attempt to prey upon a user’s fear and convince them to click the fake warnings and install malware on the device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the indications that causes High Number of ads?

A

High number of ads: As with desktops, mobile devices have become a primary target for advertising. These advertisements can be both intrusive and disruptive. Installing an ad blocker will help reduce the number of ads and pop-ups that are seen when using applications or browsing the Internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the indications that causes Unexpected application behavior?

A

Abnormal application behavior may indicate that it has been corrupted or that it is out of memory and needs to be updated. If the application is up to date and is still behaving abnormally, then the user should delete and reinstall it. If after reinstallation it is still behaving abnormally, it may not be compatible with the current version of the mobile device’s OS. Whenever downloading applications, users should always install applications from trusted and secure sources to ensure that they are not inadvertently installing malware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What happens when you jail break the phone?

A

Jailbreaking occurs when a user tampers with a device to remove the restrictions that were put in place by the manufacturer or operator to prevent a user or malicious actor from installing unauthorized software. Jailbreaking is a privilege escalation exploit that is often done through a series of kernel patches. It is seen as violation of many end-user licensing agreements, and creates multiple vulnerabilities within the device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What does android use as a trusted file format?

A

An Android Package Source (APK) file contains all the necessary files need to run an Android program. Corrupt APK files can be installed inadvertently from untrusted third-party applications that can allow attackers to gain access to the device and modify code undetected. While corrupted APK sources can create security risks, they do not inherently enable a user to gain root access to a device.

you can use this by using Google Protect.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What can you access in developer mode?

A

Developer mode is a hidden feature within Android devices that enable users to gain access to developer tools and options. Developer mode gives a user the option to run USB debugging, view/control/end running services, submit bug reports, and create password-protected backups on a desktop, among other such features. While a general user should not have access to developer mode on a company-provided device, it would not give root access as seen in this scenario.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is discourage on companies Devices?

A

Bootleg and malicious applications should never be installed on a company-provided device, and should also be discouraged on personal devices. These applications create large security risks as they can contain malware that can enable a malicious actor to gain access and exploit a device or steal information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is application spoofing?

A

For the A+ exam, you will also need to be aware of application spoofing. Application spoofing takes place when a malicious actor creates an application that is designed to impersonate a source that appears to be safe and secure. These applications are loaded with malware that will infect the device, enabling the attacker to gain access, steal information, and engage in other hostile actions. Whenever downloading an application, it is critical to verify that it is coming from a valid and trusted source to prevent any breaches.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the implication of turning on Find My iPhone feature?

A

As a result of enabling all the services required for the Find My iPhone feature, unauthorized location tracking may occur. The Find My iPhone feature requires location services to be turned on. While location services allow the device to be tracked, it can also be used by unauthorized users to compromise the device.

The Find My iPhone feature usually does not result in unintended WiFi or Bluetooth connections. It does not affect data speeds unless someone is actually using the feature to track the device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What can you do to remediate slow data speeds?

A

Slow data speeds can be the result of interference or an overloaded tower. In some cases, powering the device off and back on will reset the connection.

16
Q

What are the implications of having Wi-Fi/Bluetooth auto connect feature on?

A

Unintended Wi-Fi connection is caused by the WiFi auto-connect feature, which allows mobile device to continually look for open WiFi networks. The best way to avoid this is to disable the auto-connect. You can also disable WiFi, which has the added benefit of increased battery life.

Like unintended WiFi connections, Bluetooth-enabled devices can have unintended Bluetooth pairings or connections. With Bluetooth, an anonymous device attempts to pair with your device. Disable Bluetooth unless you are using it. If you need to keep Bluetooth enabled, make the device undiscoverable by other Bluetooth devices if available. You can also implement mobile security polices to prevent this.

17
Q

What are the two factors that causes power to be drain?

A

Bluetooth and WiFi may also cause power drain. One of the biggest power drains on phones is having WiFi and Bluetooth enabled or apps running in the background. If you are in an area where there is little or no cell coverage, your device may have to work harder to send the signals to the tower, thereby draining the battery more quickly.