In this chapter, we are going to look at different mobile devices and their characteristics and applications that run on these devices. In the Security+ exam, you need to know all of these aspects thoroughly. Let's first of all look at deploying mobile devices securely, followed by their management and security.
We will cover the following exam objectives in this chapter:
- Explaining the impact associated with types of vulnerabilities: Pointer dereference—race conditions
- Given a scenario, deploying mobile devices securely:
- Connection methods—cellular—Wi-Fi—SATCOM—Bluetooth—NFC—ANT—infrared—USB
- Mobile device management concepts—application management—content management—remote wipe—Geofencing—Geolocation—screen locks—push...