3.5 - Given a scenario, implement secure mobile solutions. Flashcards

(49 cards)

1
Q

Cellular

A

Chapple
Weiss
Gibson

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

WiFi

A

Chapple
Weiss
Gibson

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Bluetooth

A

Chapple
Weiss
Gibson

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

NFC

A

Chapple
Weiss
Gibson

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Infrared

A

Chapple
Weiss
Gibson

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

USB

A

Chapple
Weiss
Gibson

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Point-to-point

A

Chapple
Weiss
Gibson

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Point-to-multipoint

A

Chapple
Weiss
Gibson

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Global Positioning System (GPS)

A

Chapple
Weiss
Gibson

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

RFID

A

Chapple
Weiss
Gibson

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Mobile device management (MDM)

A

Chapple
Weiss
Gibson

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Application management

A

Chapple
Weiss
Gibson

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Content management

A

Chapple
Weiss
Gibson

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Remote wipe

A

Chapple
Weiss
Gibson

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Geofencing

A

Chapple
Weiss
Gibson

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Geolocation

A

Chapple
Weiss
Gibson

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Screen locks

A

Chapple
Weiss
Gibson

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Push notifications

A

Chapple
Weiss
Gibson

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Passwords and PINs

A

Chapple
Weiss
Gibson

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Biometrics

A

Chapple 440
Weiss 398-399
Gibson 169, 44-45

21
Q

Context-aware authentication

A

Chapple
Weiss
Gibson

22
Q

Containerization

A

Chapple 440
Weiss 394, 402
Gibson 169

23
Q

Storage segmentation

A

Chapple 440
Weiss 402-403
Gibson 169

24
Q

Full device encryption

A

Chapple
Weiss
Gibson

25
MicroSD hardware security module (HSM)
Chapple Weiss Gibson
26
MDM/Unified Endpoint Management (UEM)
Chapple Weiss Gibson
27
Mobile application management (MAM)
Chapple Weiss Gibson
28
SEAndroid
Chapple Weiss Gibson
29
Enforcement/monitoring of - Third-party application stores
Chapple Weiss Gibson
30
Rooting/jailbreaking (Enforcement/monitoring of)
Chapple Weiss Gibson
31
Sideloading (Enforcement/monitoring of)
Chapple Weiss Gibson
32
Custom firmware (Enforcement/monitoring of)
Chapple Weiss Gibson
33
Carrier unlocking (Enforcement/monitoring of)
Chapple Weiss Gibson
34
Firmware over-the-air (OTA) updates (Enforcement/monitoring of)
Chapple Weiss Gibson
35
Camera use (Enforcement/monitoring of)
Chapple Weiss Gibson
36
SMS/Multimedia Messaging Service (MMS)/Rich Communication Services (RCS) (Enforcement/monitoring of)
Chapple Weiss Gibson
37
External media (Enforcement/monitoring of)
Chapple Weiss Gibson
38
USB On-The-Go (USB OTG) (Enforcement/monitoring of)
Chapple Weiss Gibson
39
Recording microphone (Enforcement/monitoring of)
Chapple Weiss Gibson
40
GPS tagging (Enforcement/monitoring of)
Chapple Weiss Gibson
41
WiFi direct/ad hoc (Enforcement/monitoring of)
Chapple Weiss Gibson
42
Tethering (Enforcement/monitoring of)
Chapple Weiss Gibson
43
Hotspot (Enforcement/monitoring of)
Chapple Weiss Gibson
44
Payment methods (Enforcement/monitoring of)
Chapple Weiss Gibson
45
Bring your own device (BYOD)
Chapple Weiss Gibson
46
Corporate-owned personally enabled (COPE)
Chapple Weiss Gibson
47
Choose your own device (CYOD)
Chapple Weiss Gibson
48
Corporate-owned
Chapple Weiss Gibson
49
VDI/VMI
VDI/VMI Virtual Desktop Infrastructure Virtual Mobile Infrastructure – The apps are separated from the mobile device – The data is separated from the mobile device Data is stored securely, centralized Physical device loss - Risk is minimized Centralized app development – Write for a single VMI platform Applications are managed centrally – No need to update all mobile devices Chapple 144-145 Weiss 150 Gibson 438