15.01.2024 Views

CompTIA A+ Certification All-in-One Exam Guide

  • No tags were found...

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

mobile device problems.

Unexpected Resource Use

If you think about it, malware is just software or a program that uses your

device for work or tasks you don’t want it to do. Like any program working

hard, malware can cause resource issues. Because resource issues can also be

relatively benign problems fixed by a soft reset, it’s easy to shrug them off.

Be suspicious, especially if you see patterns and can’t find an obvious

explanation; the first clues of an ongoing attempt to spy on your company

may well be an uptick in data outbound from affected cellular devices.

Power Drain and High Resource Utilization A hot phone, high resource

use, and excessive power drain can be common signs that an app is frozen or

malfunctioning, but they might also be symptoms that your device is doing

precisely what a malware developer intends. The device might be hot,

sluggish, or low on battery because it’s a live recording device uploading

everything it records in real time, or because it’s copying files available on

the network to a remote location.

Slow Data Speeds Likewise, slow data speeds can be signs of a network

issue, signal-quality problem, frozen apps, regular syncing of large files—or

a sign the device is busy uploading or downloading something without your

knowledge. Slow data speeds may also clue you in to one or more devices

that are attempting to use an illegitimate WAP or cell tower that has a lower

capacity than its official counterpart.

Data Transmission Over Limit As discussed earlier, a data transmission

limit is a line in the sand that indicates when a device has used more data

than its plan or carrier allots for it. Perhaps the user drove across the country

while listening to Spotify, or perhaps the device is uploading stolen data from

the device and other networked locations.

Unintended Connections

A major security issue is unintended network (such as cellular, Wi-Fi, and

Bluetooth) connections. Unintended cellular network connections aren’t

common since these are preprogrammed into the phone by the carrier and

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!