Software and Troubleshooting: troubleshoot common mobile OS and application security issues Flashcards
CompTIA A+ 220-1102 Exam Criteria
What happens when an unauthorized account access?
Unauthorized account access – This occurs when settings are changed or purchases made that you did not initiate. If this occurs, you should immediately change your account password. Always monitor your account activity, and make sure that the appropriate alerts are configured for all account activity.
What happens when unauthorized root access happens?
Unauthorized root access usually results in settings changes that are not normally under regular user control. Make sure to keep your device up to date with the latest patches and upgrades to mitigate this risk.
What happens when Unauthorized location tracking happens?
Unauthorized location tracking – Location services allows apps to use query your device’s location. On Apple devices, go into Settings > Privacy > Location Services and customize each app’s location services settings. By default, most devices have the location services feature turned off.
What happens when Unauthorized camera/microphone activation?
Unauthorized camera/microphone activation – The camera and microphone can be remotely activated by a hacker, allowing them to spy on you when apps are open. Turn off your camera when not in use to provide the highest level of security. To take it one step further, you can cover cameras and microphones to keep them being remotely accessed. Leaked personal files/data can result from these security issues.
What can you do when you have sluggish response times?
A sluggish mobile device can indicate several problems, such as outdated OS, low memory, or malware. If a mobile device is beginning to slow down and disrupt productivity, users should clear their device cache, remove any unwanted applications, update the operating system, and scan the device for malware.
What happens when Data-usage limit notifications are frequently showing on the mobile device?
Mobile devices often have a maximum amount of data that they can use a month, and will alert a user when that maximum is being reached. If these alerts are frequent and are not in line with a user’s behavior, it may indicate malware is running on the device, causing it to use more bandwidth than normal.
What are the indications that causes fake security warnings?
Fake security warnings: Mobile devices can sometimes send fake spam messages stating that the device has been infected with malware and users need to react quickly. These messages are a social engineering attack that will attempt to prey upon a user’s fear and convince them to click the fake warnings and install malware on the device.
What are the indications that causes High Number of ads?
High number of ads: As with desktops, mobile devices have become a primary target for advertising. These advertisements can be both intrusive and disruptive. Installing an ad blocker will help reduce the number of ads and pop-ups that are seen when using applications or browsing the Internet.
What are the indications that causes Unexpected application behavior?
Abnormal application behavior may indicate that it has been corrupted or that it is out of memory and needs to be updated. If the application is up to date and is still behaving abnormally, then the user should delete and reinstall it. If after reinstallation it is still behaving abnormally, it may not be compatible with the current version of the mobile device’s OS. Whenever downloading applications, users should always install applications from trusted and secure sources to ensure that they are not inadvertently installing malware.
What happens when you jail break the phone?
Jailbreaking occurs when a user tampers with a device to remove the restrictions that were put in place by the manufacturer or operator to prevent a user or malicious actor from installing unauthorized software. Jailbreaking is a privilege escalation exploit that is often done through a series of kernel patches. It is seen as violation of many end-user licensing agreements, and creates multiple vulnerabilities within the device.
What does android use as a trusted file format?
An Android Package Source (APK) file contains all the necessary files need to run an Android program. Corrupt APK files can be installed inadvertently from untrusted third-party applications that can allow attackers to gain access to the device and modify code undetected. While corrupted APK sources can create security risks, they do not inherently enable a user to gain root access to a device.
you can use this by using Google Protect.
What can you access in developer mode?
Developer mode is a hidden feature within Android devices that enable users to gain access to developer tools and options. Developer mode gives a user the option to run USB debugging, view/control/end running services, submit bug reports, and create password-protected backups on a desktop, among other such features. While a general user should not have access to developer mode on a company-provided device, it would not give root access as seen in this scenario.
What is discourage on companies Devices?
Bootleg and malicious applications should never be installed on a company-provided device, and should also be discouraged on personal devices. These applications create large security risks as they can contain malware that can enable a malicious actor to gain access and exploit a device or steal information.
What is application spoofing?
For the A+ exam, you will also need to be aware of application spoofing. Application spoofing takes place when a malicious actor creates an application that is designed to impersonate a source that appears to be safe and secure. These applications are loaded with malware that will infect the device, enabling the attacker to gain access, steal information, and engage in other hostile actions. Whenever downloading an application, it is critical to verify that it is coming from a valid and trusted source to prevent any breaches.
What are the implication of turning on Find My iPhone feature?
As a result of enabling all the services required for the Find My iPhone feature, unauthorized location tracking may occur. The Find My iPhone feature requires location services to be turned on. While location services allow the device to be tracked, it can also be used by unauthorized users to compromise the device.
The Find My iPhone feature usually does not result in unintended WiFi or Bluetooth connections. It does not affect data speeds unless someone is actually using the feature to track the device.