13. Mobile and wireless security Flashcards

1
Q

What are the primary types of wireless connectivity options for enterprises?

A

Cellular networks, Wi-Fi, Bluetooth

Cellular networks are controlled by providers, Wi-Fi allows high-speed connections with security, and Bluetooth connects various devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does a site survey for wireless network design involve?

A

Physical tours of a facility, identifying existing wireless networks, access points, signal strengths

Tools are used to map the location and details important for network design.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What factors are considered in wireless network design?

A

Channel spacing, access point placement, building composition

These considerations ensure optimal wireless coverage and performance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which cryptographic and authentication protocols are commonly used in modern Wi-Fi networks?

A

WPA2, WPA3

These protocols provide secure authentication and data encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the difference between WPA2’s preshared key mode and enterprise authentication models?

A

Preshared key mode is simple; enterprise models use RADIUS servers

Enterprise models rely on organizational credentials for user login.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What vulnerabilities can arise from sideloading applications?

A

Bypassing the device’s application store

This can lead to security risks as unverified applications are installed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is jailbreaking, and what security concerns does it create?

A

Gives root access for greater control, bypasses native security model

This can expose the device to additional vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are key practices for securing wireless infrastructure?

A

Protecting wireless controllers and access points, regular updates, secure configurations

Administrative interfaces should be protected, and logging/reporting is essential.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the four deployment methods for managing mobile devices?

A
  • Bring your own device (BYOD)
  • Choose your own device (CYOD)
  • Corporate-owned, personally enabled (COPE)
  • Corporate-owned, business only (COBO)

Each method has its own risks and rewards that organizations must assess.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What tools can be used to manage mobile devices?

A

Mobile Device Management (MDM), Unified Endpoint Management (UEM)

These tools help configure, secure, and manage devices, including the ability to wipe lost or stolen devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

True or False: Heatmaps are used to help administrators understand the wireless environment.

A

True

Heatmaps provide visual representations of wireless coverage and signal strength.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Fill in the blank: _______ involves copying programs from an external device, potentially bypassing the application store.

A

Sideloading

This process can introduce security risks by allowing unverified applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What must be regularly done to wireless controllers and access points to ensure security?

A

Patching and updating

Regular maintenance is crucial for protecting the network infrastructure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly