1/31
A comprehensive set of practice flashcards covering the key concepts from Module 18: Supporting Mobile Software, including security, deployment models, Intune/MDM concepts, troubleshooting, IoT, app security, and common mobile security symptoms.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
What are the three main sections of Module 18: Supporting Mobile Software?
Configure mobile operating system security; troubleshoot mobile operating system and app software; troubleshoot mobile operating system and app security.
What is the first topic under Configure mobile operating system security?
Screen locks.
Describe a screen lock with swipe and its risk.
The screen appears locked but unlocks with a swipe; no authentication is required, making it insecure.
What is a secure screen lock and what options does it include?
A lock that requires authentication such as a PIN, password, fingerprint, facial recognition, or pattern.
Name two popular screen lock methods besides swipe.
Fingerprint and pattern (also PIN or password).
What is failed login attempts lockout and why is it important?
After several failed attempts, the device locks or times out to prevent password guessing.
What does Enterprise Mobility Management (EMM) refer to in this module?
Mobile Device Management (MDM) for managing devices in an organization.
What does BYOD stand for and what is its main drawback?
Bring Your Own Device; drawback is less control over the device and higher risk of security issues.
What is corporate owned deployment?
Company-owned devices issued to users with greater control and policy enforcement.
What is Intune in the context of mobile management?
Microsoft Intune, a cloud-based MDM/MAM platform to enroll, manage, and secure devices.
What does enrollment mean in Intune?
Registering a device to be managed by Intune.
What can Intune do once devices are enrolled?
View device type and specs, OS version/build, install/uninstall apps, remote wipe, and enforce security profiles.
What is remote wipe and when might it not work?
Remotely erase a device; may not work if the device is offline or powered off.
What is a locator app and what are its drawbacks?
An app like Find My iPhone/Find My Device to locate a lost device; drains battery and data and may fail if the device is off or SIM removed.
What is Internet of Things (IoT) as discussed in this module?
Internet of Things; everyday devices connected to the internet (e.g., home automation, smart hubs, ATMs).
What are mobile device troubleshooting tools and how are they accessed?
Built-in tools on the device, accessed via Settings or the notification shade; reboot is a common first step.
What is the last-resort troubleshooting option for mobile devices?
Factory reset, which wipes all data and returns the device to factory state.
What are common causes for mobile OS update failures?
Compatibility issues, network connectivity, insufficient battery life, or inadequate storage.
What are common causes of random device reboots?
Overheating, using the device while charging, or problematic updates.
What is the gyroscope and how does it relate to auto-rotate?
The gyroscope controls auto-rotate; if rotation stops working, check device settings or app-specific behavior.
What steps should you take to troubleshoot connectivity issues on mobile devices?
Check signal strength and interference, ensure airplane mode is off, verify network settings (Wi‑Fi, Bluetooth, NFC), and confirm passwords/IPs.
What does NFC stand for?
Near Field Communication.
What is root access vs jailbreaking?
Root access (Android) and jailbreaking (iOS) unlock hidden developer options and tools.
Why might rooting or jailbreaking void a device’s warranty?
It's considered tampering with the device, which can void warranty and complicate service.
What are app source security concerns on mobile devices?
Apps come from stores (Play Store, App Store, App Gallery); risk of rogue apps, spoofing, and fake reviews.
What is app spoofing and what problem does it create?
Malicious apps posing as legitimate ones; can mislead users with fake reviews and downloads.
What are common mobile security symptoms to watch for?
High ads, fake security warnings, slow performance, limited internet connectivity, and unexpected app behavior.
How do locator apps impact battery life and data usage?
They use GPS and constant location services, which can drain battery and data and may fail if data or GPS is off.
What does MAM stand for and how does it relate to MDM?
Mobile Application Management; focuses on managing apps, complementing MDM which manages devices.
What enrollment methods are mentioned for Microsoft Intune besides provisioning during setup?
SCCM (System Center Configuration Manager) and Autopilot.
What does 'unsavory websites' refer to in this context?
Unsafe or illegal websites; potential malware risk when BYOD is used.
What is the purpose of 'Find My Phone' type locator services and their limitation in theft scenarios?
To locate a lost device; may fail if the device is turned off or the SIM is removed or data is unavailable.