Upgrade to remove ads
Chapter 10 systems security
Terms in this set (44)
The Google operating system for mobile devices that is not proprietary
See mobile application management (MAM).
Maintaining an accurate record of company-owned mobile devices.
A secure repository for storing valuable authentication information on a mobile device
Using a mobile's device's GPS to define geographical boundaries where an app can be used.
Adding or allowing geographical identification data in a mobile app.
The operation of stockrooms where mobile devices are stored prior to their dispersal.
The operating system for Apple mobile devices that is a closed and proprietary architecture
Services that can identify the location of a person carrying a mobile or a specific store or restaurant
A technology that prevents a mobile device from being used until the user enters the correct passcode
mobile application management (MAM)
The tools and services responsible for distributing and controlling access to apps. Also called application control
mobile device management (MDM)
Tools that allow a device to be managed remotely.
The ability to quickly remove devices from the organization's network
The ability to rapidly enroll new mobile devices
The ability to remotely erase sensitive data stored on a mobile device
Secure Digital (SD)
A small form factor storage media of a variety of different types and sizes
A mobile cell phone that has an operating system for running apps and accessing the Internet
Portable computing device that is generally larger than smartphones and smaller than notebooks, and is focused on ease of use.
Which technology is NOT a characteristic of a mobile device?
Each optional feature is found in most mobile devices EXCEPT
Which type of computer most closely resembles a desktop computer?
Tablet computers are designed for_______
ease of use
One of the first mobile devices was a ________.
PDA- personal digital assistance.
Which of these is NOT a size of SD cards?
Which of these is NOT a risk of connecting a mobile device to a public network?
public networks are faster than local networks and can spread malware more quickly to mobile devices
Mobile devices using _______________ are at increased risk of targeted physical attacks.
What is one reason Android devices are considered to be at a higher security risk than iOS devices?
Android apps cab be sideloaded.
Which of these can a QR code NOT contain?
What prevents a mobile device from being used until the user enters the correct passcode?
Bob has attempted to enter the passcode for his mobile device but keeps entering the wrong code. Now he is asked to enter a special phrase to continue. This means that Bob's mobile device is configured to _________.
reset to factory settings
What does containerization do?
It separate personal data from corporate data?
which of these is NOT a security feature for locating a lost or stolen mobile device?
last known good configuration
What enforces the location in which an app can function by tracking the location of the mobile devices?
Which of these is NOT an advantage of BOYD for an organization?
Which mobile device is the smallest?
Where does a web-based computer store user files?
Which of these is NOT a type of SD card?
Why is it challenging for an attacker to compromise an Apple iOS application?
Closed and proprietary architecture
Which of the following uses SMS messaging between devices?
How does a bus mastering feature allow a CardBus to be more efficient when accessing data?
Communicating with devices without the CPU
How would an app be restricted by MDMs based on geographical criteria?
Which of the following is NOT a security feature provided by mobile devices?
GPS tracking of dead devices
Which of the following is NOT an accurate description of a laptop?
Hardware limits upgrading the OS
There are three types of PC cards that all share which common trait?
64 pin connector
This set is often in folders with...
Security+ Security Fundamentals Chapter 4
System Security Ch8
Security+ Chapter 5 review questions
System Security Ch4
You might also like...
Chapter 10: Mobile Device Security
Chapter 10: Mobile Device Security
Chapter 10 Key Terms Sec+
Mark Ciampa SY0-401 CHAPTER 10 Mobile Device Secur…
Other sets by this creator
CEHv10 Chapter 11
Scanning and enumeration
CEH v10 vocabulary
CEH Syntax Cards
Other Quizlet sets
ISDS Test 1
COB Chapter 5
Computer Concepts Chap #1