Section 5: Mobile Device Security Flashcards

1
Q

What is WPA2 in relation of wifi? What encryption standard does it use?

A

Wifi-Protected Access 2 (WPA2) is the highest level of security for wifi and it uses AES.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How security work in bluetooth?

A

Bluetooth pairs using a Link Key to encrypt its connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is SMS-Phising?

A

Pre-Txt scam that link out to malware containing sites.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a SIM card?

A

Subscriber Identity Module (SIM) is an integrated circuit that securely stores the International Mobile Subscriber Identity (IMSI) number and its related key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is SIM cloning?

A

SIM Cloning allows tow phones to utilize the same service and allow an attacker to gain access to the phones data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is phone highjacking?

A

Phone Highjacking is taking over a phone number using social engineering or SIM cloning to gain access to 2-factor authentication and takes over other account from the victim.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Bluejacking?

A

Bluejacking is sending unsolicited messages to bluetoother enable devices. Sending

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Bluesnarfing?

A

Bluesnarfing is taking information from a device over bluetooth connection. Taking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are two types of bluetooth attacks?

A

Bluejacking (sending data)

Bluesnarfing (taking data)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Remote wipe?

A

Remote wipe is the process of remotely wiping a device from the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is Remote Lock?

A

Remote Lock is the process of remotely encrypting a device requiring a special password to decrypt the phone.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is TLS?

A

Transport Layer Security (TLS) creates a secure tunnel between the site and device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is MDM in relation to device security?

A

Mobile Device Management (MDM) is centralized software solution that allows system administrators to create and enforce policies across it mobile device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the most dangerous device model in a work place?

A

Bring your own device BYOD is the most dangerous because it incurs many possible problems that the employer cannot control. Security is heavily left up to the employee.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is Storage Segmentation in relation to devices?

A

Storage segmentation is the process of creating clear separations between personal and company data on a single device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is one Administrative and one Technical control in relation to Storage Segmentation on devices?

A

Technical Control - an app that all work is done on

Administrative - a policy that says how data should be used.

17
Q

What its the CYOD model for mobile devices at a business?

A

Chose your own device (CYOD) is a mobile device model where the employer gives the employee a few choices in devices that MDM and other security policies built into them.

18
Q

What are the 10 ways you can harden your mobile devices?

A
  1. Update devices
  2. Instal AntiVirus/Malware
  3. User Training on proper security and use of devices
  4. Officail mobile Apps only
  5. No jailbroken or rooted phones
  6. SIMv2
  7. Turn off all unnecessary features
  8. Turn on encryption voice and data
  9. String Passwords, biometrics, Find my phone, remote wipe/lock
  10. NO BYOD (bring your own device)