3.5 Given a scenario, implement secure mobile solutions.3.6 Given a scenario, apply cybersecurity solutions to the cloud. Flashcards

1
Q

What features of Airwatch can benefit a company?

A

Full drive encryption, containerization, application management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

CYOD

A

This is a policy used by organizations that allows employees to choose their own devices for work purposes, from a list of approved options. It’s a strategy that sits between “Bring Your Own Device” (BYOD) and standard issue corporate devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

BYOD

A

It’s a policy used by organizations where the company owns the devices (like smartphones, tablets, laptops) but allows employees to use them for personal reasons as well. This approach gives the organization more control over the device, ensuring security and compliance, while still offering flexibility to the employee.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

COPE

A

“COPE” stands for “Corporate-Owned, Personally-Enabled.” It’s a policy used by organizations where the company owns the devices (like smartphones, tablets, laptops) but allows employees to use them for personal reasons as well. This approach gives the organization more control over the device, ensuring security and compliance, while still offering flexibility to the employee.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

CASB

A

A Cloud Access Security Broker (CASB) is a part of security as a service that monitors network traffic between a company’s network and cloud provider, enforcing security policies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Iaas

A

Infrastructure as a Service, (IaaS) allows for the outsourcing of equipment and support operations. The service provider owns, maintains, and manages the equipment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Attestation

A

Attestation is the process of checking and validating system files during a boot process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Regional Replication

A

Regional replication (also called zone-redundant storage) replicates your data across multiple data centers within one or two regions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

NSWG

A

Next-generation secure web gateway (SWG) is a modern implementation of content filters that also performs threat analysis and other integrated services like data loss prevention (DLP).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What security issues can occur when using a Bluetooth device?

A

Authentication and authorization occur when devices authenticate using a simple passkey configured on both devices.
Device discovery occurs when a device can be put into discoverable mode, meaning that it will connect to any other Bluetooth devices nearby, which can pose a security issue.
Malware occurs when there are proof-of-concept Bluetooth worms and application exploits, which can compromise any active and unpatched system, regardless of whether discovery is enabled and without requiring any user intervention.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How do you jailbreak a device?

A

A user boots the device with a patched kernel while the device is attached to a computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Firewall filterting at layer 3

A

Firewall filtering at layer 3 of the Open Systems Interconnection (OSI) model can isolate communication between the on-site backup solution and the cloud storage service via IP address. This prevents other services or external threats from access the cloud resource.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Network location

A

A network location identifies a user or device based on an IP address, subnet, virtual LAN (VLAN), or organizational unit (OU). This can be used as an account restriction mechanism.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

geolocation

A

A geolocation can be determined by IP addresses provided by an Internet Service Provider (ISP) which are linked to geographical areas. Global positioning system (GPS) sensors can also determine geolocation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

geotagging

A

Geotagging refers to the addition of location metadata to files or devices. This is often used for asset management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

geofencing

A

Geofencing refers to accepting or rejecting access requests based on geographic location. Geofencing can also be used for push notifications to send alerts or advice to a device when a user enters a specific area.

14
Q

Risky login policy

A

A risky login (also known as impossible travel time) policy tracks the location of login events over time. If these do not meet a threshold, the account will be disabled, notifying the real user of an account issue.

15
Q

Identity provider

A

The identity provider is the service that provisions the user account and processes authentication requests. In this scenario, various protocols and frameworks are available to implement federated identity management across web-based services.

16
Q

Identity attributes

A

Identity attributes enable access management systems to make informed decisions about whether to grant or deny an entity access. A person’s role is an example of an identity attribute.