Lesson 9 - Supporting Mobile Software Flashcards

(20 cards)

1
Q

What is BYOD?

A

Bring your own device means the mobile device is owned by the employee. The mobile will have to meet whatever profile is required by the company (in terms of OS version and functionality), and the employee will have to agree on the installation of corporate apps and to some level of oversight and auditing. This model is usually the most popular with employees but poses the most difficult for security and network managers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a COBO device?

A

Corporate owned, business only means the device is the property of the company and may only be used for company business.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a COPE device?

A

Corporate owned, personally enabled device means the device is chosen and supplied by the company and remains its property. The employee may use it to access personal email and social media accounts and for personal web browsing (subject to whatever acceptable use policies are in force).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is CYOD device?

A

Choose your own device means that the device is still owned by the company but the employee is given a choice of device from a list.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the difference between a device wipe and an enterprise wipe?

A

A device wipe performs a factory default reset and clears all data, apps, and settings. An enterprise wipe removes any corporate accounts and files but leaves personal apps, accounts, settings, and files untouched.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What two types of biometric authentication mechanism are supported on smartphones?

A

Fingerprint recognition and facial recognition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

True or false? Updates are not necessary for iOS devices because the OS is closed source.

A

False. Closed source just means that the vendor controls development of the OS. It is still subject to updates to fix problems and introduce new features.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A company wants to minimize the number of devices and mobile OS versions that it must support but allow use of a device by employees for personal email and social networking. What mobile deployment model is the best fit for these requirements?

A

Corporate owned, personally enabled (COPE) will allow standardization to a single device and OS. As the requirement does not specify a single device and OS, choose your own device (CYOD) would also fit.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The marketing department has refitted a kitchen area and provisioned several smart appliances for employee use. Should the IT department have been consulted first?

A

Yes. Uncontrolled deployment of network-enabled devices is referred as shadow IT. The devices could increase the network attack surface and expose it to vulnerabilities. The devices must be deployed in a secure configuration and monitored for security advisories and updates.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

True or false? A factory reset preserves the user’s personal data.

A

False. Restoring to factory settings means removing all user data and settings.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

You are updating an internal support knowledge base with advice for troubleshooting mobile devices. What is the first step to take if a user reports that an app will not start?

A

Use force stop if available and/or reboot the device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

You are troubleshooting a user device that keeps powering off unexpectedly. You run hardware diagnostics and confirm there is no component fault or overheating issue. What should your next troubleshooting step be?

A

Check that the device has sufficient spare storage, and check for updates. If you can’t identify a device-wide fault, test to see whether the issue is associated with use of a single app.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is root access?

A

Root access is associated with Android devices. Some vendors provide authorized mechanisms for users to access the root account on their device. For some devices it is necessary to exploit a vulnerability or use custom firmware. Custom firmware is essentially a new Android OS image applied to the device. This can also be referred to as a custom ROM, after the term for the read-only memory chips that used to hold firmware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is jailbreak?

A

Jailbreak is a term becoming popular for exploits that enabled the user to obtain root privileges, sideload apps, change or add carriers, and customize the interface. iOS jailbreaking is accomplished by booting the device with a patched kernel. For most exploits, this can only be done when the device is attached to a computer while it boots (tethered jailbreak).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is developer mode?

A

Developer mode makes advanced configuration settings and diagnostic/log data available. Developer mode should not necessarily weaken the security configuration, but equally, it should be used only for actual app development work and not enabled routinely. It can purposefully be misused to install bootleg apps.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is .APK file format?

A

.APK is Android app package format used when sideloading software from a source other than a trusted store.

17
Q

What is a bootleg app?

A

A bootleg app is software that illegally copies or imitates a commercial product or brand.

18
Q

You are assisting with the configuration of MDM software. One concern is to deny access to devices that might be able to run apps that could be used to circumvent the access controls enforced by MDM. What types of configurations are of concern?

A

Devices that are jailbroken or rooted allow the owner account complete control. Devices that allow installation of apps from untrusted sources, such as by sideloading APK packages or via developer mode, could also have weakened permissions.

19
Q

A user reports that a new device is not sustaining a battery charge for more than a couple of hours. What type of malware could this be a symptom of?

A

This is most characteristic of cryptomining malware as that explicitly hijacks the compute resources of a device to perform the intensive calculations required to mint blockchain currency.

20
Q

Advanced malware can operate covertly with no easily detectable symptoms that can be obtained by scanning the device itself. What other type of symptom could provide evidence of compromise in this scenario?

A

Leaked data files or personal information such as passwords.