Lesson 13: Implementing Secure Mobile Solutions

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

An attacker steals personal data from a user device with an outdated Bluetooth authentication mechanism. What type of attack has occurred?

Bluesnarfing

Pilots in an Air Force unit utilize government-issued tablet devices loaded with navigational charts and aviation publications, with all other applications disabled. This illustrates which type of mobile device deployment?

COBO

The owner of a company asks a network manager to recommend a mobile device deployment model for implementation across the company. The owner states security is the number one priority. Which deployment model should the network manager recommend for implementation?

COBO because the company retains the most control over the device and applications.

Analyze and compare iOS and Android operating systems (OS) to accurately differentiate between the two. (Select all that apply.)

iOS is limited to Apple products, while Android has multiple hardware vendors. Android is an open source OS based on Linux, unlike iOS, which is a closed and proprietary system.

An attacker uses spoofed GPS coordinates on a stolen mobile device, attempting to gain access to an enterprise network. Which statement best describes the attack vector?

The attacker uses spoofed coordinates to defeat geofencing on the target network.

A user facing a tight deadline at work experiences difficulties logging in to a network workstation, so the user activates a smartphone hotspot and connects a personal laptop to save time. Which of the following vulnerabilities has the user potentially created for the enterprise environment?

The device may circumvent data loss prevention and web content filtering policies.

Analyze mobile device deployment models to select the best explanation of the Corporate Owned, Personally-Enabled (COPE) deployment model.

The employee may use the mobile device to access personal email and social media accounts. The device is chosen and supplied by the company.

A user would like to install an application on a mobile device that is not authorized by the vendor. The user decides the best way to accomplish the install is to perform rooting on the device. Compare methods for obtaining access to conclude which type of device the user has, and what actions the user has taken.

The user has an Android device and has used custom firmware to gain access to the administrator account.

Analyze the following scenarios and determine which accurately describes the use of an ad hoc Wi-Fi network.

Two or more wireless devices connect to each other on a temporary basis.

Which microwave connection mode is most appropriate for forming a strong connection between two sites?

P2P


Ensembles d'études connexes

Chapter 4: Enabling Business-To-Consumer Electronic Commerce

View Set

Enrollment Guidance Medicare Advantage & Part D Plans

View Set

PNL210 - practical nursing lab (week 1-5)

View Set

Psych 110 Study questions Exam 1

View Set

social psychology - exam #2 (ch. 4, 6, 7)

View Set

II Chapter 9 - Web & Database Attacks

View Set