3.5 - Mobile Security Flashcards

1
Q

What is a point-to-point connection?

A

A one-to-one connection. Typically, this is connection between buildings. Wi-Fi repeaters are an example.

It is a conversation between two devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a point-to-multipoint?

A

The access point connects to multiple devices. This is the most common form under the 802.11.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are some security concerns with cellular networks?

A

1) Traffic Monitoring
2) Location Tracking
3) Worldwide access to a mobile device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are some security concerns with Wi-Fi networks?

A

1) Data capture
2) On-path attack
3) DOS (frequency interference)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are several types of mobile networks?

A

1) Bluetooth
2) Cellular
3) RFID (Radio-Frequency Identification)
4) Wi-Fi
5) NFC (Near Field Communication)
6) IR (Infrared)
7) USB
8) GPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How does RFID work?

A

Radar

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the security concerns with NFC?

A

1) Remote Capture
2) Frequency jamming
3) Relay / Replay attack
4) Loss of RFC device control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a large security concern with IR (infrared)?

A

Other IR devices can control your IR device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is MCM?

A

Mobile Content Management

Used to secure access to data and to protect data from outsiders on mobile devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is DLP?

A

Data Loss Prevention

To prevent the loss of sensitive data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How can you delete everything on a mobile device?

A

Remote Wipe in MDM.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is MDM?

A

Mobile Device Management

Allows you to manage company-owned and user-owned mobile devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is Geofencing?

A

Restricting or allowing features when the device is in a particular area.

For authentication, you can allow only logins from a certain location or country.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What can you manage with MDM?

A

1) Geofencing
2) Geolocation
3) Screen lock (how many attempts?)
4) Remote Wipe
5) Push notification services
6) Passwords and Pins
7) Biometrics (can be per device or per application)
8) Full device encryption (how much vs. battery life
and CPU)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is context-aware authentication?

A

Authentication that depends on contexts like: normal IP address, GPS information, Bluetooth devices, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is containerization in mobile device management?

A

The attempt to separate the data that is stored on the device. (Example: Corporate and personal data on a BYOD)

Create a virtual “container”, a contained area to limit data sharing, for company data. Storage segmentation keeps data separate.

17
Q

What is a MicroSD HSM (Hardware Security Module)?

A

It provides security services, including encryption, key generation, digital signatures, and authentication. It can provide secure storage, protect private keys, or store cryptocurrency.

18
Q

What is a Unified Endpoint Management (UEM)?

A

Allows you to manage mobile and non-mobile devices. Applications can be used across different platforms.

19
Q

What is Mobile Application Management (MAM)?

A

Provisions, updates, and removes apps. It can create an enterprise app catalog. It can monitor application use. It can remotely wipe application data.

20
Q

What is SEAndroid?

A

Security Enhancements for Android

It uses SELinux. It supports access control security policies. SEAndroid is the default version since 4.3.

Protects privileged Android system demons. It changed Discretionary Access Control (DAC) to Mandatory Access Control (MAC), which moved from user-assigned control to object labels and minimum user access. It isolates and sandboxes Android apps.

Allows for Centralized policy configuration.

21
Q

What are some forms of Mobile Device Managament?

A

1) BYOD
2) Corporate owned, personally enabled (COPE)
- Org chooses and manages device, but it can be
used for personal
3) CYOD
- You choose, corporate buys, and can be used for
personal
4) Corporate-owned
5) Virtual Desktop Infrastructure/ Virtual Mobile
Infrastructure (VDI/ VMI)
- Apps and data are separated from the mobile
device

22
Q
A