Lesson 12 - Chapter 3: Mobile OS and Application Security Issues Flashcards

1
Q

What are trusted sources?

A

legitimate app stores run by major vendors (Apple, Google, Microsoft, Amazon)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Do modified versions of Android change which stores and sources a device will/won’t trust?

A

Yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which OS allows installing apps from untrusted sources?

A

Android

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What restrictions does Apple place on developers for apps sold via the App store?

A

Apple has specific requirements for how developers create an app to be sold in the store

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What would be an example of modified versions of Android changing which stores a device will/won’t trust?

A

Amazon’s line of Fire devices can only get apps from the Amazon App store

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which app store is more likely to have security issues?

A

Google Play

(aren’t subject to guidelines as strict as Apple Store)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are 3 examples of legitimate third-party app sources?

A
  1. Device manufacturers
  2. Communication carriers
  3. In-house corporate dev sources
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are 4 tools you can use to identify and mitigate network attack risks?

A
  1. Device security settings (no auto-connect)
  2. User training
  3. Wi-Fi analyzers
  4. Cell tower analyzers
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What can you use to configure mobile device security settings for more than one device?

A

MDM or similar software (like Apple Configurator)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a Wi-Fi analyzer typically used for? (3)

A

figuring out what channel a network should use. optimizing WAP placement, finding dead spots

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What can you use to map out nearby networks to identify malicious WAPs?

A

Wi-Fi Analyzer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are cell tower analyzers used for? (4 out of more)

A
  1. identify nearby cellular signals
  2. estimate distance and direction
  3. measure signal strength (in a building)
  4. collect information on the technologies they’re using and network name
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How can cell tower analyzers help with network security?

A

spots an illegitimate tower operating nearby

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Does malware and security breaches manifest differently on mobile devices than on desktops and laptops?

A

Yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which OS is more susceptible to malware infections?

A

Android lacks safeguards that iOS has (malware infections are almost impossible on iOS devices)

can supplement with 3rd party antivirus/anti-malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What’s the most important thing when it comes to anti-malware solutions?

A

keeping the device updated (whether by the user or implementing policies on an Enterprise level)

17
Q

Why are unintended cellular connections uncommon?

A

Because they’re preprogrammed into the phone by the carrier

18
Q

What is tower-spoofing?

A

equipment that imitates a carrier’s tower and tricks devices into using it

19
Q

How does tower-spoofing work?

A

it overpowers the nearest legitimate cell signal, causing the cellphone to lock onto the spoofed tower instead

20
Q

What can someone do once you’ve connected to a spoofed tower?

A

listen to your conversations even if it’s encrypted because some can fool the device to turning off encryption and even install malware

21
Q

Is it a good idea to configure your device to automatically connect to unknown Wi-Fi networks or auto pair with Bluetooth devices?

A

No, people can get access and steal or modify data

22
Q

What’s a sign you may be interacting with a spoofed cell tower?

A

signal drops or weak signals

23
Q

What are some signs there may be a rogue WAP? (2)

A

Wi-Fi quality is low where it used to be high, or your device sees a network with a strong signal and correct SSID in what used to be a dead spot

24
Q

Removable memory cards should be ___ if they contain sensitive data

A

encrypted (in case someone removes it from the device)

25
Q

To keep VPN and email connections secure, a device should not do what?

A

store user names and passwords to connect automatically

26
Q

To help secure the device, all mobile OS restrict what?

A

the actions a user can perform (installing apps, changing settings)

27
Q

What is jailbreaking?

A

the user installs a program on an iOS device to change settings the user isn’t intended to change

28
Q

What is rooting?

A

the user installs a program on an Android device to enable functions the user previously didn’t have access to

29
Q

Does jailbreaking/rooting void the warranty?

A

Yes

30
Q

What’s a positive and negative in terms of jailbreaking/rooting?

A

get more power but disable protections that limit the damage malware can do

31
Q

What might happen if you decide to jailbreak/root a phone? (3)

A
  1. Brick the phone if it fails
  2. Render it unusable until you restore it from backup after removing rooting software
  3. Manufacturer/Service provider may prevent the device from connecting to their services if the rooting is detected
32
Q

What is geofencing?

A

A company keeping track of when an employee enters/exits the workplace by tracking their device

(employees don’t like this)

33
Q

What drains a cellphone battery the fastest?

A

leaving the screen on