GCGA Ch. 5 Deploying Mobile Devices Securely (ST) Flashcards

(11 cards)

1
Q

COPE

A

Corporate-owned, personally enabled (COPE) mobile devices are owned by the organization, but employees can use them for personal reasons.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

BYOD vs CYOD

A

Bring your own device (BYOD) policies allow employees to connect their mobile devices to the organization’s network. Choose your own device (CYOD) policies include a list of acceptable devices and allow employees who own one of these devices to connect them to the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

VDI

A

A virtual desktop infrastructure (VDI) is a virtual desktop, and these can be created so that users can access them from a mobile device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

MDM

A

Mobile device management (MDM) tools help ensure that devices meet minimum security requirements. They can monitor devices, enforce security policies, and block network access if devices do not meet these requirements. MDM tools can restrict applications on devices, segment and encrypt data, enforce strong authentication methods, and implement security methods such as screen locks and remote wipe. Containerization is useful when using the BYOD model.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Screen lock

A

like a password-protected screen saver on desktop systems that automatically locks the device after some time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Remote wipe signal

A

removes all the data from a lost phone.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Geolocation

A

uses Global Positioning System (GPS) to identify a device’s location. Geofencing uses GPS to create a virtual fence or geographic boundary. Organizations use geofencing to enable access to services or devices within the boundary and block access outside the boundary.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Geotagging

A

uses GPS to add geographical information to files (such as pictures) when posting them on social media sites.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Third-party app store

A

something other than the primary store for a mobile device. Apple’s App Store is the primary store for Apple devices. Google Play is a primary store for Android devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Jailbreaking

A

removes all software restrictions on Apple devices, and rooting provides users with root-level access to an Android device. Custom firmware can also root an Android device. MDM tools block network access for jailbroken or rooted devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Sideloading

A

the process of copying an application to an Android device instead of installing it from an online store. Tethering allows one mobile device to share its Internet connection with other devices. Wi-Fi Direct allows you to connect devices together without a wireless router.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly