Configure Mobile OS Security Flashcards

lesson 18A (24 cards)

1
Q
A

Configuring screen lock options in iOS (left) and Android (right).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
A

Google Play store has a Play Protect feature that is enabled by default.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
A

Endpoint management software such as Microsoft Intune can be used to approve or prohibit apps.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
A

In iOS, the data protection encryption option is enabled when a passcode is configured (left, at
bottom)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
A

Using Google’s default remote backup service.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
A

You can use the Google’s Find Device app to locate an Android device and remotely lock or wipe it
(or send the current holder a polite message to please return it ASAP).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
A

Philips Hue smart lighting management app. management app connects to the hub (a Hue Bridge) via Wi-Fi.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Screen locks

A

protect mobile devices from unauthorized access, preventing attackers from stealing cached passwords, confidential files, and message history that could aid social engineering attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

screen lock ensures

A

device security by requiring an unlock gesture after inactivity or a power button press. While a simple swipe allows unauthenticated access, personal devices should be protected with an authentication method like a PIN, password, pattern, or biometric verification.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Screen locks prevent

A

unauthorized access by requiring authentication methods like a PIN, password, fingerprint, or facial recognition, securing mobile devices against threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Mobile security software protects

A

devices against malware, phishing, and exploits, using patches, antivirus, anti-malware apps, and firewalls. Keeping OS and app updates current is essential, with iOS updates delivered via Settings > General > Software Update and Android updates managed by vendors through Settings > System > Advanced > System updates.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Antivirus apps

A

filter content, block phishing sites, and monitor app permissions, while firewalls manage network activity by controlling connections to ports or IP addresses. “No-root” firewalls create a VPN to regulate app access without requiring root privileges.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Enterprise Mobility Management (EMM)

A

ensures secure mobile device usage in corporate environments through deployment models like BYOD, COBO, COPE, and CYOD. Mobile Device Management (MDM) enforces security policies, restricting app use, managing updates, and controlling built-in functions. Organizations tailor security profiles based on employee roles and site requirements, applying both technical restrictions and soft measures like training to enhance data protection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

BYOD

A

model allows employees to use personal devices for work but requires security oversight to mitigate risks like unauthorized access and data exposure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

COBO (Corporate Owned, Business Only) model

A

ensures strict security by providing company-owned devices that are exclusively used for work-related tasks, preventing personal use and reducing data exposure risks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

COPE (Corporate Owned, Personally Enabled) model

A

provides employees with company-owned devices, allowing limited personal use while enforcing security policies to maintain corporate control and data protection.

17
Q

CYOD (Choose Your Own Device) model

A

allows employees to select a device from an approved list, balancing personal preference with company security requirements while maintaining corporate control over configurations and policies.

18
Q

Mobile data security

A

helps prevent unauthorized access to sensitive information when a device is lost or stolen. Device encryption protects stored data, with iOS using multi-layer encryption and Android offering file-level encryption by default since Android 10. In iOS, Data Protection encryption is enabled when a passcode lock is set, safeguarding email and app data.

19
Q

Remote backup applications

A

ensure mobile devices retain critical data by syncing with cloud services like iCloud (iOS), Google Sync (Android), and OneDrive (Microsoft). Users can also opt for third-party providers such as Dropbox or backup directly to a PC, with iOS supporting backups via macOS or iTunes on Windows. MDM software can further automate backups for corporate-managed devices.

20
Q

Locator apps

A

use GPS and IPS to track lost or stolen mobile devices, with built-in find-my-phone features available on Android and iOS. These apps can remotely lock the device, display recovery messages, disable wallets, prevent passcode changes, and block network settings from being altered.

21
Q

remote wipe

A

If a device is unrecoverable, a remote wipe can erase all data, returning it to factory settings. For corporate devices enrolled in MDM, an enterprise wipe can remove business accounts and files while preserving personal apps and data.

22
Q

Internet of Things (IoT) security

A

focuses on protecting connected devices—such as home automation systems, smart appliances, and vehicles—from cyber threats. These devices communicate using networked sensors and software, making them potential targets for unauthorized access, data breaches, and malware attacks. Securing IoT requires strong encryption, regular software updates, and strict access controls to prevent vulnerabilities.

23
Q

Home Automation Systems

A

Home automation systems use smart hubs, wireless mesh networking, and IoT-enabled devices to allow remote control of household functions while ensuring seamless communication between connected appliances.

24
Q

IoT security risks

A

stem from weak default settings, inadequate patching, and unauthorized device deployments, requiring regular audits and employee training to mitigate vulnerabilities.