In this chapter, we are going to look at different mobile devices and their characteristics and applications that run on these devices. In the Security+ exam, you need to know all of these aspects thoroughly. Let's first of all look at deploying mobile devices securely, followed by their management and security.
We will cover the following exam objectives in this chapter:
- Explaining the impact associated with types of vulnerabilities: Pointer dereferenceârace conditions
- Given a scenario, deploying mobile devices securely:
- Connection methodsâcellularâWi-FiâSATCOMâBluetoothâNFCâANTâinfraredâUSB
- Mobile device management conceptsâapplication managementâcontent managementâremote wipeâGeofencingâGeolocationâscreen locksâpush...