3.5 Implement Secure Mobile Solutions Flashcards

1
Q

Mobile network connection used to connect two locations using directional antennas

A

Point to point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the three main concerns with NFC security?

A

Remote capture
Jamming
Replay attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Management practice that allows a company centralized management of all mobile devices across the organization.

A

MDM (Mobile device Management)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What can a manager use to control the apps that can be installed on mobile devices?

A

Allow list

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a mobile content management (MCM)?

A

Used to secure and protect data on mobile devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The concept of combining multiple scenarios together as a method of authentication (i.e. where you login from, where you are geo-located, Bluetooth pairings)

A

Context-aware authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Process of creating separate partitions on a mobile device to separate personal and business info. Great for offboarding employees.

A

Containerization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How can you protect data on a mobile device to where even if the device is lost, the attacker cannot access any of the data?

A

Full device Encryption (FDE)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

HSM that can be used in a mobile device to provide encryption, key generation, and digital signatures.

A

MicroSD HSM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Management system that allows you to manage security postures across mobile devices and workstations. Allows apps to be shared across multiple platforms.

A

Unified Endpoint Management (UEM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Management system that allows you to manage apps running on mobile devices by monitoring, provisioning, and wiping data.

A

Mobile application management (MAM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Security policies and access control that applies to Android operating systems. Prevents malicious activity and changed from DAC to MAC.

A

SEAndroid

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does it mean for a device to receive updates OTA?

A

Over the air, no physical connection required

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is USB OTG?

A

USB on the go, allows two devices to directly connect to each other

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What type of connection is often found in IoT devices that allows you to connect to them via a wifi connection for setup?

A

Wifi Direct

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the COPE mobile deployment model?

A

Corporate owned, personally enabled

Company provides device, can be used for personal and corporate means

17
Q

Mobile device deployment policy that separates the apps and data from the mobile device. Generally uses a remote desktop connection and apps are managed centrally.

A

VDI/VMI (virtual desktop/mobile infrastructure)