11A: Recognize Mobile Device Vulnerabilities Flashcards

3.5 Explain common attacks and vulnerabilities against specialized systems

1
Q

A MDM model where the mobile device is owned by the employee; however, it must be corporate compliant in terms of OS version and functionality. (Answer in 4 letter acronym format XXXX)

A

BYOD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A MDM model where the device is the property of the company and may only be used for company business. (Answer in 4 letter acronym format XXXX)

A

COBO (corporate owned business only)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A MDM model where the device is supplied and owned by the company. The employee may use it to access personal email, social media, and web browsing; however, they must be compliant with any acceptable use policies in force. (Answer in 4 letter acronym format XXXX)

A

COPE (corporate owned personally enabled)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A MDM model that is much the same as COPE; however, the employee can select a device from a curated list. (Answer in 4 letter acronym format XXXX)

A

CYOD (choose your own device)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A class of management software designed to apply security policies to mobile devices and apps in the enterprise. (Answer in 3 letter acronym format XXX)

A

Enterprise Mobility Management (EMM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Software that allows deletion of data and settings on a mobile device to be initiated from a remote server.

A

remote wipes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Sets device policies for authentication, feature use, such as camera and microphone, and connectivity. This tool can also allow device resets and remote wipes. (Answer in 3 letter acronym format XXX)

A

MDM (mobile device management)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Sets policies for apps that can prevent unauthorized apps from being installed, automatically push out updates, and enable clients to select from a list of corporate compliant apps to be installed. (Answer in 3 letter acronym format XXX)

A

MAM (mobile application management)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A threat that can occur when device updates are not implemented in a timely manner.

A

patching fragmentation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly