Module 18: Supporting Mobile Software

0.0(0)
studied byStudied by 0 people
full-widthCall with Kai
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/31

flashcard set

Earn XP

Description and Tags

A comprehensive set of practice flashcards covering the key concepts from Module 18: Supporting Mobile Software, including security, deployment models, Intune/MDM concepts, troubleshooting, IoT, app security, and common mobile security symptoms.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

32 Terms

1
New cards

What are the three main sections of Module 18: Supporting Mobile Software?

Configure mobile operating system security; troubleshoot mobile operating system and app software; troubleshoot mobile operating system and app security.

2
New cards

What is the first topic under Configure mobile operating system security?

Screen locks.

3
New cards

Describe a screen lock with swipe and its risk.

The screen appears locked but unlocks with a swipe; no authentication is required, making it insecure.

4
New cards

What is a secure screen lock and what options does it include?

A lock that requires authentication such as a PIN, password, fingerprint, facial recognition, or pattern.

5
New cards

Name two popular screen lock methods besides swipe.

Fingerprint and pattern (also PIN or password).

6
New cards

What is failed login attempts lockout and why is it important?

After several failed attempts, the device locks or times out to prevent password guessing.

7
New cards

What does Enterprise Mobility Management (EMM) refer to in this module?

Mobile Device Management (MDM) for managing devices in an organization.

8
New cards

What does BYOD stand for and what is its main drawback?

Bring Your Own Device; drawback is less control over the device and higher risk of security issues.

9
New cards

What is corporate owned deployment?

Company-owned devices issued to users with greater control and policy enforcement.

10
New cards

What is Intune in the context of mobile management?

Microsoft Intune, a cloud-based MDM/MAM platform to enroll, manage, and secure devices.

11
New cards

What does enrollment mean in Intune?

Registering a device to be managed by Intune.

12
New cards

What can Intune do once devices are enrolled?

View device type and specs, OS version/build, install/uninstall apps, remote wipe, and enforce security profiles.

13
New cards

What is remote wipe and when might it not work?

Remotely erase a device; may not work if the device is offline or powered off.

14
New cards

What is a locator app and what are its drawbacks?

An app like Find My iPhone/Find My Device to locate a lost device; drains battery and data and may fail if the device is off or SIM removed.

15
New cards

What is Internet of Things (IoT) as discussed in this module?

Internet of Things; everyday devices connected to the internet (e.g., home automation, smart hubs, ATMs).

16
New cards

What are mobile device troubleshooting tools and how are they accessed?

Built-in tools on the device, accessed via Settings or the notification shade; reboot is a common first step.

17
New cards

What is the last-resort troubleshooting option for mobile devices?

Factory reset, which wipes all data and returns the device to factory state.

18
New cards

What are common causes for mobile OS update failures?

Compatibility issues, network connectivity, insufficient battery life, or inadequate storage.

19
New cards

What are common causes of random device reboots?

Overheating, using the device while charging, or problematic updates.

20
New cards

What is the gyroscope and how does it relate to auto-rotate?

The gyroscope controls auto-rotate; if rotation stops working, check device settings or app-specific behavior.

21
New cards

What steps should you take to troubleshoot connectivity issues on mobile devices?

Check signal strength and interference, ensure airplane mode is off, verify network settings (Wi‑Fi, Bluetooth, NFC), and confirm passwords/IPs.

22
New cards

What does NFC stand for?

Near Field Communication.

23
New cards

What is root access vs jailbreaking?

Root access (Android) and jailbreaking (iOS) unlock hidden developer options and tools.

24
New cards

Why might rooting or jailbreaking void a device’s warranty?

It's considered tampering with the device, which can void warranty and complicate service.

25
New cards

What are app source security concerns on mobile devices?

Apps come from stores (Play Store, App Store, App Gallery); risk of rogue apps, spoofing, and fake reviews.

26
New cards

What is app spoofing and what problem does it create?

Malicious apps posing as legitimate ones; can mislead users with fake reviews and downloads.

27
New cards

What are common mobile security symptoms to watch for?

High ads, fake security warnings, slow performance, limited internet connectivity, and unexpected app behavior.

28
New cards

How do locator apps impact battery life and data usage?

They use GPS and constant location services, which can drain battery and data and may fail if data or GPS is off.

29
New cards

What does MAM stand for and how does it relate to MDM?

Mobile Application Management; focuses on managing apps, complementing MDM which manages devices.

30
New cards

What enrollment methods are mentioned for Microsoft Intune besides provisioning during setup?

SCCM (System Center Configuration Manager) and Autopilot.

31
New cards

What does 'unsavory websites' refer to in this context?

Unsafe or illegal websites; potential malware risk when BYOD is used.

32
New cards

What is the purpose of 'Find My Phone' type locator services and their limitation in theft scenarios?

To locate a lost device; may fail if the device is turned off or the SIM is removed or data is unavailable.