Lesson 9 - Supporting Mobile Software Flashcards
(20 cards)
What is BYOD?
Bring your own device means the mobile device is owned by the employee. The mobile will have to meet whatever profile is required by the company (in terms of OS version and functionality), and the employee will have to agree on the installation of corporate apps and to some level of oversight and auditing. This model is usually the most popular with employees but poses the most difficult for security and network managers.
What is a COBO device?
Corporate owned, business only means the device is the property of the company and may only be used for company business.
What is a COPE device?
Corporate owned, personally enabled device means the device is chosen and supplied by the company and remains its property. The employee may use it to access personal email and social media accounts and for personal web browsing (subject to whatever acceptable use policies are in force).
What is CYOD device?
Choose your own device means that the device is still owned by the company but the employee is given a choice of device from a list.
What is the difference between a device wipe and an enterprise wipe?
A device wipe performs a factory default reset and clears all data, apps, and settings. An enterprise wipe removes any corporate accounts and files but leaves personal apps, accounts, settings, and files untouched.
What two types of biometric authentication mechanism are supported on smartphones?
Fingerprint recognition and facial recognition.
True or false? Updates are not necessary for iOS devices because the OS is closed source.
False. Closed source just means that the vendor controls development of the OS. It is still subject to updates to fix problems and introduce new features.
A company wants to minimize the number of devices and mobile OS versions that it must support but allow use of a device by employees for personal email and social networking. What mobile deployment model is the best fit for these requirements?
Corporate owned, personally enabled (COPE) will allow standardization to a single device and OS. As the requirement does not specify a single device and OS, choose your own device (CYOD) would also fit.
The marketing department has refitted a kitchen area and provisioned several smart appliances for employee use. Should the IT department have been consulted first?
Yes. Uncontrolled deployment of network-enabled devices is referred as shadow IT. The devices could increase the network attack surface and expose it to vulnerabilities. The devices must be deployed in a secure configuration and monitored for security advisories and updates.
True or false? A factory reset preserves the user’s personal data.
False. Restoring to factory settings means removing all user data and settings.
You are updating an internal support knowledge base with advice for troubleshooting mobile devices. What is the first step to take if a user reports that an app will not start?
Use force stop if available and/or reboot the device.
You are troubleshooting a user device that keeps powering off unexpectedly. You run hardware diagnostics and confirm there is no component fault or overheating issue. What should your next troubleshooting step be?
Check that the device has sufficient spare storage, and check for updates. If you can’t identify a device-wide fault, test to see whether the issue is associated with use of a single app.
What is root access?
Root access is associated with Android devices. Some vendors provide authorized mechanisms for users to access the root account on their device. For some devices it is necessary to exploit a vulnerability or use custom firmware. Custom firmware is essentially a new Android OS image applied to the device. This can also be referred to as a custom ROM, after the term for the read-only memory chips that used to hold firmware.
What is jailbreak?
Jailbreak is a term becoming popular for exploits that enabled the user to obtain root privileges, sideload apps, change or add carriers, and customize the interface. iOS jailbreaking is accomplished by booting the device with a patched kernel. For most exploits, this can only be done when the device is attached to a computer while it boots (tethered jailbreak).
What is developer mode?
Developer mode makes advanced configuration settings and diagnostic/log data available. Developer mode should not necessarily weaken the security configuration, but equally, it should be used only for actual app development work and not enabled routinely. It can purposefully be misused to install bootleg apps.
What is .APK file format?
.APK is Android app package format used when sideloading software from a source other than a trusted store.
What is a bootleg app?
A bootleg app is software that illegally copies or imitates a commercial product or brand.
You are assisting with the configuration of MDM software. One concern is to deny access to devices that might be able to run apps that could be used to circumvent the access controls enforced by MDM. What types of configurations are of concern?
Devices that are jailbroken or rooted allow the owner account complete control. Devices that allow installation of apps from untrusted sources, such as by sideloading APK packages or via developer mode, could also have weakened permissions.
A user reports that a new device is not sustaining a battery charge for more than a couple of hours. What type of malware could this be a symptom of?
This is most characteristic of cryptomining malware as that explicitly hijacks the compute resources of a device to perform the intensive calculations required to mint blockchain currency.
Advanced malware can operate covertly with no easily detectable symptoms that can be obtained by scanning the device itself. What other type of symptom could provide evidence of compromise in this scenario?
Leaked data files or personal information such as passwords.