13. Mobile and wireless security Flashcards
What are the primary types of wireless connectivity options for enterprises?
Cellular networks, Wi-Fi, Bluetooth
Cellular networks are controlled by providers, Wi-Fi allows high-speed connections with security, and Bluetooth connects various devices.
What does a site survey for wireless network design involve?
Physical tours of a facility, identifying existing wireless networks, access points, signal strengths
Tools are used to map the location and details important for network design.
What factors are considered in wireless network design?
Channel spacing, access point placement, building composition
These considerations ensure optimal wireless coverage and performance.
Which cryptographic and authentication protocols are commonly used in modern Wi-Fi networks?
WPA2, WPA3
These protocols provide secure authentication and data encryption.
What is the difference between WPA2’s preshared key mode and enterprise authentication models?
Preshared key mode is simple; enterprise models use RADIUS servers
Enterprise models rely on organizational credentials for user login.
What vulnerabilities can arise from sideloading applications?
Bypassing the device’s application store
This can lead to security risks as unverified applications are installed.
What is jailbreaking, and what security concerns does it create?
Gives root access for greater control, bypasses native security model
This can expose the device to additional vulnerabilities.
What are key practices for securing wireless infrastructure?
Protecting wireless controllers and access points, regular updates, secure configurations
Administrative interfaces should be protected, and logging/reporting is essential.
What are the four deployment methods for managing mobile devices?
- Bring your own device (BYOD)
- Choose your own device (CYOD)
- Corporate-owned, personally enabled (COPE)
- Corporate-owned, business only (COBO)
Each method has its own risks and rewards that organizations must assess.
What tools can be used to manage mobile devices?
Mobile Device Management (MDM), Unified Endpoint Management (UEM)
These tools help configure, secure, and manage devices, including the ability to wipe lost or stolen devices.
True or False: Heatmaps are used to help administrators understand the wireless environment.
True
Heatmaps provide visual representations of wireless coverage and signal strength.
Fill in the blank: _______ involves copying programs from an external device, potentially bypassing the application store.
Sideloading
This process can introduce security risks by allowing unverified applications.
What must be regularly done to wireless controllers and access points to ensure security?
Patching and updating
Regular maintenance is crucial for protecting the network infrastructure.