Mobile Device Security & Data Destruction Flashcards

Managing Security Settings Part 1_Day10 (135 cards)

1
Q

Why is mobile device hardening important?

A

Mobile device hardening is important to protect data confidentiality, integrity, and availability, and to improve overall security for both devices and organizations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are common risks associated with mobile devices?

A

Mobile devices are prone to being stolen or lost, frequently used on unsecured public Wi-Fi, and may have outdated software or unapproved apps.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a measure to protect data on mobile devices?

A

Configuring local device encryption ensures that data at rest is inaccessible, even if the device is lost or stolen.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What should be enabled to prevent unauthorized access to mobile devices?

A

The lock screen should be enabled after a configurable time of inactivity to prevent unauthorized access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a Mobile Device Management (MDM) platform?

A

An MDM platform manages multiple devices by installing a local agent that enables configuration policies and settings defined by administration.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What can MDM platforms enforce on mobile devices?

A

MDM platforms can enforce encryption, configure screen locks, restrict app installs, and apply network settings.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What happens if a device is lost or stolen?

A

Remote wipe and remote lock can be invoked to prevent access to local data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Why is it important for mobile devices to receive regular updates?

A

Regular updates ensure that security flaws in the operating system or apps are addressed, preventing vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How does MDM help with updates?

A

MDM ensures that all devices receive the same updates and helps to manage compliance with minimum version requirements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are best practices for mobile device hardening?

A

Best practices include using a VPN on untrusted networks, disabling unnecessary transmission components, removing unused apps, and isolating personal data in BYOD environments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What should organizations conduct to ensure mobile device security?

A

Organizations should conduct regular audits and compliance checks and educate users on mobile device risks and hygiene practices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What happens when files are deleted or hard drives are formatted?

A

Data is not really deleted; it is marked as available for new data to overwrite.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the two primary categories of data destruction methods?

A
  • Logical destruction (wiping/overwriting)
  • Physical destruction (destroying devices).
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What does logical destruction involve?

A

Using data wiping and overwriting applications to replace original data with random passes of 1s and 0s.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How does physical destruction work?

A

It involves destroying storage devices through methods like degaussing, shredding, or incinerating.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are best practices for media sanitization?

A

Create a written policy, tag and track retired devices, and apply sanitization classifications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

How can you determine the IP address of your router?

A

Type ipconfig in the command prompt. The default gateway is the address you’re looking for.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is recommended for the SSID of your Wi-Fi network?

A

Do not leave the SSID as something that indicates ownership or location, such as your last name or address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is the purpose of a Guest Wi-Fi network?

A

To have access to the Internet only, without accessing the resources on the primary network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What should you do with the default credentials of your router?

A

Immediately change the router’s default credentials for security reasons, as they are often easy to guess.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is a common rule for port forwarding?

A

To enable remote desktop access into your computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What information do you need to create a port forwarding rule?

A

You need the internal or private IP address of the system you want to connect to.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is an important first step in securing a router?

A

Immediately change the default administrative credentials to something more secure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Why is it a concern if the router’s credentials are written on a sticker?

A

Anyone with physical access can easily log into the router’s interface.

This is more critical in an office environment than at home.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
What should be enabled for secure access to the router's configuration interface?
Enable HTTPS only to encrypt data during transmission.
26
What features should be disabled on a router for better security?
Disable Universal Plug and Play and Remote Management unless secured with HTTPS.
27
What is recommended for Wi-Fi security?
Use strong and unique Wi-Fi passphrases and WPA3 for the highest level of security.
28
What can VLAN segmentation help with?
It helps isolate traffic within the same overall network infrastructure.
29
What is a guest wireless network similar to?
It is similar to a vLAN, allowing separate networks that do not communicate with each other.
30
What is a DMZ in the context of networking?
A ***Demilitarized Zone (DMZ)*** *allows certain services within your network to be exposed to the public Internet*.
31
How do DMZs differ from VLANs?
DMZs use Port Forwarding. vLANS define separate networks with different IP address ranges.
32
What should be done before setting up a DMZ?
Assign a static IP address to the system that will be exposed.
33
What is a critical consideration when exposing a device in a DMZ?
Only open the necessary ports that are appropriate to the service it provides.
34
What should you do with a SOHO router's firmware?
Keep the firmware up-to-date to patch known vulnerabilities.
35
What should you do if your router allows scheduling for firmware updates?
Schedule automatic update checks regularly or check manually every month.
36
What is Quality of Service (QoS) in networking?
A feature that prioritizes critical services to ensure they receive more bandwidth.
37
What are browsers considered in terms of security risks?
Browsers are common attack vectors because they provide access to the Internet.
38
How can browsers be secured?
Browsers must be secured through configuration settings and user awareness of risks.
39
What are common browser threats?
Common threats include: * hidden malicious scripts * drive-by downloads * phishing websites * malvertising and tracking cookies
40
What is private or incognito mode in browsers?
***Private*** or ***incognito mode*** prevents the browser from saving history, form data, and cookies.
41
When is private or incognito mode particularly useful?
It's useful on shared devices to ensure that information is not accessible to the next user.
42
What can users do to manage their browser data?
Users can manually clear the browser cache, history, and cookies, or configure the browser to do so automatically.
43
Are cached data and cookies inherently malicious?
No, cached data and cookies are generally not malicious; the risk lies in what others could do with that information.
44
What do built-in pop-up blockers do?
Pop-up blockers prevent one site from launching multiple sites or windows that may contain ads or malicious content.
45
What should you do if a trusted site requires disabling the pop-up blocker?
It's acceptable to disable the pop-up blocker for trusted sites or internal applications.
46
How can you verify a site's security certificate?
Look for a padlock icon in the address bar, which indicates a secured HTTP or HTTPS connection.
47
Does having a certificate guarantee a site's legitimacy?
No, an attacker could create a site with a fake certificate that appears legitimate.
48
What is a common method used in phishing scams?
Phishing scams often involve emails directing users to sites that mimic legitimate ones, lacking proper certificates.
49
What should you do if you encounter certificate warnings?
Always heed certificate warnings as they indicate potential security issues.
50
What is secure DNS?
***Secure DNS*** runs the DNS protocol over ***HTTPS or TLS*** to ***ensure domain name lookups occur over secure connections***.
51
What do built-in anti-phishing tools do in browsers?
They warn users if they arrive at a suspicious site.
52
What feature do most browsers have for managing passwords?
Most browsers have built-in password managers that store and fill credentials automatically.
53
What is account storage for passwords?
Account storage refers to storing passwords with online accounts, allowing access across devices.
54
What is browser hardening?
***Browser hardening*** is *the process of configuring browsers with increased security to minimize the attack surface they present.*
55
Why is browser hardening important for small or remote office environments?
Small or remote office environments typically lack robust management services to automatically configure devices and applications.
56
What are the goals of browser hardening?
The goals include blocking malicious content, preventing unauthorized access to data, and reducing exposure to phishing scams.
57
What tools can be used for browser hardening?
Tools include script blockers and ad blockers that prevent harmful JavaScript code and misleading ads.
58
Where can script blockers and ad blockers typically be found?
They are usually available by default within the settings of the browser.
59
What should be considered when installing browser extensions?
Only install extensions from known or trusted sources and review any required permissions.
60
What should be done with unknown or untrusted extensions?
Remove any unknown, unused, or questionable extensions and disable legacy plug-ins like Flash or Java.
61
How can you verify a secure connection when entering credentials?
Always check that HTTPS is being used and view the certificate information by clicking on the padlock icon.
62
What is the purpose of HTTPS-Only mode in browsers?
It warns users if they arrive at any site that isn't using HTTPS.
63
What should you do with self-signed certificates?
Verify that the issuing authority is the trusted organization itself.
64
What do modern browsers include for password management?
Most modern browsers include password managers that securely store passwords and support encryption.
65
What should you avoid when using password managers?
Avoid saving credentials if the browser stores them in plain text or without encryption.
66
What is breach monitoring in password managers?
***Breach monitoring*** *alerts users if a newly created password is known to have been breached*.
67
What is required to reveal stored passwords in a password manager?
Re-authentication is required to reveal stored passwords.
68
What is the benefit of using strong and unique passwords?
Strong and unique passwords limit the risk of multiple services being compromised if one password is breached.
69
What is the purpose of sandboxed user profiles?
Sandboxed user profiles isolate browsing activities from the primary user account to limit data leakage.
70
When can sandboxed user profiles be useful?
They can be used for security testing or when working in a development environment.
71
What might cause unexpected router reboots?
Unexpected router reboots might result from overheating, unstable power supply, firmware issues, or too many simultaneous connections.
72
How can you protect a router from power issues?
Use a surge protector and/or a uninterruptible power supply (UPS) to protect against surges, brownouts, or outages.
73
What are common performance issues with routers?
Common performance issues include DNS problems, intermittent Internet access, and slow domain name lookups.
74
How can you address DNS problems with a router?
Reconfigure the router to use a public DNS server like Google (8.8.8.8) or Cloudflare (1.1.1.1).
75
What should you do if the router's DNS forwarding is not functioning correctly?
Try disabling DNS relay or configure client devices to use the DNS servers directly.
76
What is the default DNS configuration for home routers?
By default, home routers use their DNS server, which forwards requests to the ISP's DNS servers.
77
How can you alleviate DNS processing on a router?
You can configure DNS servers directly on each client device while leaving DHCP enabled for IP address assignment.
78
What might cause slow throughput on a router?
Slow throughput could be due to interference from devices like microwaves, too much traffic, or using legacy Wi-Fi standards.
79
What Wi-Fi standards are faster than 802.11b/g?
***Wi-Fi 6*** (*802.11ax*) and ***Wi-Fi 7*** (*802.11be*) are faster than the ***older*** 802.11b/g standards.
80
What is the benefit of using wired connections over wireless?
Wired connections offer better speed and reliability compared to wireless connections.
81
What issues can arise from using hubs in a network?
Hubs can cause frequent packet collisions and signal interference because they transmit data to all ports.
82
What is full-duplex mode in networking?
Full-duplex mode allows an interface to transmit and receive data simultaneously, unlike half-duplex mode.
83
How can you manage multiple devices connecting to a router?
Limit the number of simultaneous connections and ensure proper spacing between access points to reduce channel overlap.
84
What should you check for general troubleshooting?
Check the router logs for connection uptime, DHCP address assignments, and any intrusion attempts.
85
What diagnostic tools are available on routers?
Built-in diagnostic tools like ping and traceroute are usually available through the router's GUI.
86
Why are mobile device backups important?
Mobile device backups are crucial to recover from loss, theft, or failure, and to reduce downtime associated with getting back to a functional state.
87
What risks do mobile devices face compared to desktop computers?
Mobile devices are ***more prone*** to accidental deletions, data corruption, loss, or theft.
88
What can happen if mobile devices contract malware?
Malware can damage the operating system or apps, or compromise sensitive information.
89
What is a BYOD policy?
***Bring Your Own Device (BYOD)*** a *policy allowing employees to use their personal devices for work purposes.*
90
How can iOS users back up their devices?
iOS users can configure iCloud backups through ***Settings > User account > iCloud > iCloud Backups***
91
What types of data does iCloud back up?
iCloud backs up photos, text or iMessages, email, Apple Pay settings, and more.
92
What is a requirement for cloud backups?
Cloud backups typically require connectivity to a Wi-Fi network due to large data sizes.
93
How can Android users back up their devices?
Android users can access Google Backup through ***Settings > System > Backups > Google One***.
94
What does Google Backup synchronize?
Google Backup synchronizes app data, device settings, call logs, text messages, and local device configuration.
95
What is a benefit of local backups?
***Local backups*** can *offer faster recovery and more control over the restoration process.*
96
What tools can be used for local backups?
Tools include: * iTunes for iOS or * Android Debug Bridge for Android can be used for local backups
97
How can you protect backed up data?
You can enable encryption for backups to protect data even if the backup location is lost or stolen.
98
What is a potential issue with local backups?
Local backups can only be accessed when you have access to the device on which they are stored.
99
Why should you periodically verify your backups?
Verifying backups helps prevent unexpected issues during restoration.
100
What should you check after restoring data?
Check for any corrupted or missing data to ensure that your system is functioning normally.
101
What are verification logs or checksums used for?
They are used to ensure the integrity of your backups and confirm that data has not been altered.
102
When should you perform manual backups?
Perform manual backups before significant changes, like operating system updates, to ensure recovery options.
103
How many copies of backups should you maintain?
Maintain at least two copies of your backups, ideally one in the cloud and one locally.
104
What should you do with outdated backup sets?
Periodically delete outdated backups to free up space, especially if cloud storage is limited.
105
What is a common approach to restrict mobile device features in corporate environments?
Using a Mobile Device Management (MDM) platform to define and deploy configuration profiles to registered devices.
106
How can access to restricted features be managed?
Access can be restricted from certain applications or defined security roles within an organization.
107
What is a geofence?
A ***geofence*** is a *defined location using GPS coordinates that allows for location-based restrictions*.
108
How can geofences be used in mobile device management?
Enable or disable feature restrictions based on whether a device is inside, or outside the parameters of a geofence configuration.
109
What is Kiosk Mode?
***Kiosk Mode*** that *locks a device to a specific app or function, preventing access to other features or settings*.
110
Where might you encounter Kiosk Mode in use?
In restaurants using tablets for menus or in directories for large buildings or campuses.
111
What is required to implement Kiosk Mode?
Typically a configuration tool like an MDM service or a third-party kiosk application.
112
What are some best practices for applying mobile device hardware restrictions?
Assess role-based needs, use layered policy enforcement, and apply priority values to policies.
113
What complicates security in BYOD policies?
Security. This means administrators must ensure devices can be managed while balancing usability, privacy, and compliance.
114
What is a common concern with BYOD regarding corporate data?
A common concern is the leakage of corporate data through personal apps.
115
What are two methods to keep personal and enterprise data separate on BYOD devices?
***Containerization*** and ***Profile Separation*** are two methods to keep personal and enterprise data separate.
116
What is Mobile Device Management (MDM)?
Gives administration the sophistication to manage mobile devices and their configuration, typically for corporately-owned devices.
117
What is geofencing in the context of BYOD?
Geofencing controls access to resources based on the device's location.
118
What can organizations do to manage data on BYOD devices?
Organizations can use managed apps for secure delivery and lifecycle management of corporate data.
119
What is an acceptable use policy for mobile devices?
It outlines acceptable and unacceptable actions related to using a mobile device in a corporate environment.
120
When must users acknowledge the policy?
During the onboarding process before using their devices.
121
What are some examples of acceptable use?
Work-related calls, emails, using collaboration tools, VPN usage, and secure file sharing apps. Limited personal use may also be permitted. ## Footnote Example: Local personal calls if approved by the policy.
122
What are examples of unacceptable use?
Installing unauthorized apps, bypassing security features, storing confidential data in personal cloud apps, and accessing adult content or pirated content.
123
How can organizations enforce the acceptable use policy?
By using Mobile Device Management (MDM) tools to restrict app installations, monitor compliance, and control access to resources.
124
How can app-level policies help in BYOD situations?
App-level policies can apply restrictions only when specific work-related apps are being used.
125
What control does an organization have over corporately owned devices?
Full control over device functionality and configuration, including locking down features and settings.
126
How can organizations assist with policy adherence?
By providing training on secure mobile usage and user-friendly guides for employees.
127
What are common security issues in smaller environments?
Smaller environments often have limited IT staff, unmanaged devices, default credentials, inadequate Wi-Fi security, outdated firmware, and patching gaps, increasing the likelihood of security breaches.
128
What should be done with default credentials on devices?
Change default credentials on devices to strong, unique passwords that can be securely stored.
129
How can you change remote management ports for security?
Change the default remote management ports (80 for HTTP and 443 for HTTPS) to random higher value ports, such as in the 50000 range.
130
How do you access a router with a custom port?
* [Example] access a router using an IP address type 192.168.10.16 * [Example] access a router using an IP address with a custom port type ***192.168.10.16:50000 in the browser***
131
What is one way to enhance security against unauthorized logins?
Configure alerts for unauthorized login attempts, depending on the router's make and model.
132
What is network segmentation and its benefit?
***Network segmentation*** *helps limit lateral movement across a network in case of a breach; it can be implemented using guest networks on routers.*
133
What is DNS filtering?
***DNS filtering*** *blocks access to known malicious domains, reducing malware infections and phishing scams*.
134
Where can DNS filtering be configured?
DNS filtering can be configured on small routers or at the device level, often requiring a device management platform.
135
How can user awareness improve security?
***Educating users*** about *phishing scams, secure password habits, multi-factor authentication (MFA), and safe use of cloud tools can enhance security*.