13. Mobile and wireless security Flashcards

1
Q

What are the objectives covered in Chapter 13?

A

Domain 2.0: Threats, Vulnerabilities, and Mitigations; Domain 3.0: Security Architecture; Domain 4.0: Security Operations

Includes specific objectives like explaining vulnerabilities and comparing security strategies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What types of vulnerabilities are discussed in this chapter?

A

Mobile device vulnerabilities: Side loading, Jailbreaking

These vulnerabilities can compromise the security of mobile devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are some general data considerations mentioned?

A

Geolocation

Geolocation can impact data security and privacy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does hardening targets involve?

A

Hardening targets: Mobile devices, Workstations, Switches, Routers, Cloud infrastructure, Servers, ICS/SCADA, Embedded systems, RTOS, IoT devices

Hardening is essential for protecting various types of computing resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the key mobile solutions discussed?

A

Mobile device management (MDM); Deployment models: Bring your own device (BYOD), Corporate-owned, personally enabled (COPE), Choose your own device (CYOD); Connection methods: Cellular, Wi-Fi, Bluetooth

These solutions help manage and secure mobile devices in organizations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What wireless security settings are mentioned?

A

Wi-Fi Protected Access 3 (WPA3); AAA/Remote Authentication Dial-in User Service (RADIUS); Cryptographic protocols; Authentication protocols

These settings are critical for securing wireless networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

True or False: Wireless networks have the same security challenges as wired networks.

A

False

Wireless networks broadcast signals and can be accessed from outside organizational spaces.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are some common wireless connectivity options?

A

Bluetooth; Cellular; Wi-Fi

Understanding these options is essential for wireless network design.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the importance of wireless authentication?

A

Ensures secure access to wireless networks

EAP (Extensible Authentication Protocol) is commonly used for this purpose.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the mobile device deployment models?

A

Bring your own device (BYOD); Choose your own device (CYOD); Corporate-owned, personally enabled (COPE)

These models influence how organizations provide devices to users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the role of mobile device management (MDM)?

A

To manage and secure mobile devices throughout their life cycles

MDM tools help ensure devices are secure from issuance to retirement.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Fill in the blank: The traffic on most cellular and point-to-point commercial wireless networks may need to be treated as if it is traversing a _______.

A

potentially hostile network path

This is due to the lack of customer control over these networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are some best practices for wireless network design?

A

Site surveys; Heat maps

These practices help optimize wireless network performance and security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the three key wireless connectivity options that organizations may deploy?

A

Wi-Fi, cellular, and Bluetooth

These technologies are essential for connecting devices and systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Why is it important to understand common attacks against wireless networks?

A

It helps security professionals design a secure wireless network

Understanding potential attacks informs better security measures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What role do site surveys play in network design?

A

They help understand the environment where the network will be deployed

Site surveys can include heatmaps to visualize signal propagation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What do heatmaps in the context of network design show?

A

Signal propagation

Heatmaps assist in determining optimal device placement.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What are some concerns when protecting controllers and access points?

A

Patching, maintenance, and secure remote access

Protecting these components is crucial for overall network security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What does WPA3 provide in terms of authentication?

A

Simultaneous authentication of equals (SAE) and enterprise models

Enterprise models connect to RADIUS servers for organizational credentials.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What are EAP and its variants used for?

A

Authentication protocols

They allow choices based on hardware support and specific authentication needs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What are the two main deployment models for mobile devices?

A

BYOD processes and corporate-owned models

BYOD allows users to bring their own devices, while corporate models deploy locked-down devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is the purpose of mobile device management tools?

A

To manage and secure mobile devices

MDM tools provide a range of features necessary for security professionals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What does BYOD stand for?

A

Bring Your Own Device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What are the advantages of BYOD?

A
  • More user freedom
  • Lower cost to the organization
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What is a disadvantage of BYOD?

A

Greater risk since the organization does not control, secure, or manage the device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What does CYOD stand for?

A

Choose Your Own Device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

In a CYOD model, who owns the device?

A

The organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What is the main advantage of the COPE model?

A

Allows reasonable personal use while meeting enterprise security and control needs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What does COBO stand for?

A

Company-Owned Business Only

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What is the key feature of COBO devices?

A

Used only for business work with no personal use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What is Virtual Desktop Infrastructure (VDI)?

A

A technology that allows low-security devices to access a secured, managed environment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

What is mobile device hardening?

A

The process of securing mobile devices to resist threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Name two benchmarks available for mobile device hardening.

A
  • iOS benchmark
  • Android benchmark
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

What is a key practice in hardening mobile devices?

A

Updating and patching the OS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

What is the function of remote wipe capability?

A

Used to erase data on a device when lost or stolen

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

True or False: Remote wipe can only wipe organizational data and applications.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

What does MDM stand for?

A

Mobile Device Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

What is the main purpose of MDM tools?

A

To manage mobile devices and ensure data security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

What does UEM stand for?

A

Unified Endpoint Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

What is the difference between MDM and UEM?

A

MDM focuses on mobile devices, while UEM integrates management of various devices including desktops and laptops

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

What are application management features in MDM?

A
  • Deploying specific applications
  • Limiting application installations
  • Monitoring application usage
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

What is content management in the context of mobile devices?

A

Ensures secure access and control of organizational files on mobile devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

What is geolocation used for in mobile device management?

A

To make decisions about device operation based on its location

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

What is the purpose of screen locks, passwords, and PINs?

A

To prevent unauthorized access to mobile devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

What are biometrics in mobile devices?

A

Authentication methods like fingerprints and facial recognition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

What is context-aware authentication?

A

Authentication that considers user behavior and context, such as location and usage patterns

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

What does containerization do for mobile devices?

A

Separates work and personal-use contexts to reduce risk of data exposure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

What is full-device encryption (FDE)?

A

A security measure to protect data on lost or stolen devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

What is the benefit of push notifications in MDM?

A

To alert users or communicate important messages from a central location

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

What is the role of storage segmentation?

A

To keep personal and business data separate on mobile devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

What is the impact of rooting or jailbreaking a device?

A

Allows users to bypass security controls and install unauthorized software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

What are some controls organizations may implement for wireless connectivity?

A
  • Limiting Wi-Fi network connections
  • Preventing ad hoc networks
  • Disabling tethering
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

What are some features MDM tools may include?

A
  • Per-application VPN
  • Onboarding tools for BYOD
  • Advanced threat detection
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

What is a challenge of managing mobile devices?

A

Variability between hardware manufacturers and operating system limitations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

Fill in the blank: The _______ model provides the greatest control but the least flexibility.

A

Fully corporate-owned

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

What is one of the key best practices recommended by the NSA for mobile device security?

A

Implementing strong authentication measures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

What are the types of wireless networks commonly found in organizations?

A

Wi-Fi, Bluetooth, cellular, Zigbee

These networks differ in functionality and security challenges.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

What is the primary function of cellular networks?

A

Provide connectivity for mobile devices by dividing areas into ‘cells’ with tower coverage

Modern cellular networks use technologies like LTE and 5G.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

What are the key differences between 4G and 5G networks?

A

4G requires fewer antennas; 5G requires greater antenna density and provides greater bandwidth and throughput

5G networks also necessitate careful antenna placement in building designs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

How is cellular connectivity typically provided?

A

By a cellular carrier rather than the organization itself

This means cellular networks are managed outside the organization’s control.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

What does Wi-Fi primarily rely on for wireless networking?

A

2.4 GHz and 5 GHz radio bands

Wi-Fi signals can be blocked by obstacles like walls or trees.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

List the current and historical Wi-Fi standards mentioned.

A
  • 802.11b
  • 802.11a
  • 802.11g
  • 802.11n
  • 802.11ac
  • 802.11ax
  • 802.11be

Each has its own maximum speed and frequency.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

What are the maximum speeds of 802.11ax and 802.11be?

A

802.11ax: 9.6 Gbit/s; 802.11be: 40+ Gbit/s

802.11be also supports multiple frequency bands.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

What security features do WPA2 and WPA3 provide?

A
  • Encryption options
  • Protection for network frames
  • Authentication options

These features help secure Wi-Fi networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

What is the typical range for Bluetooth connections?

A

Less than 100 meters, typically 5–30 meters

Bluetooth is designed for low-power, short-range connections.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

What are the four security modes of Bluetooth?

A
  • Security Mode 1: No security
  • Security Mode 2: Service-level enforced security
  • Security Mode 3: Link-level enforced security
  • Security Mode 4: Standard pairing with Security Simple Pairing

These modes determine the security level of Bluetooth connections.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

What types of RFID tags exist?

A
  • Active tags
  • Semi-active tags
  • Passive tags

Each type has different power sources and functionalities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

What are the frequency ranges used by RFID tags?

A
  • Low-frequency
  • High-frequency
  • Ultra-high-frequency

Different ranges cater to various applications and distances.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

What is the primary function of GPS technology?

A

To provide positioning and navigation using a constellation of satellites

GPS can position devices within a foot of their actual location.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

True or False: GPS signals can be jammed or spoofed.

A

True

GPS jamming is illegal in the United States.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

What is NFC primarily used for?

A

Very short-range communication between devices

Commonly used in payment systems like Apple Pay and Google Pay.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

What are the characteristics of infrared (IR) networking?

A

Works in line of sight; supports low to gigabit speeds

IR networks are less common today, having been largely replaced by Bluetooth and Wi-Fi.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

What are the four major wireless connection models?

A
  • Point-to-point
  • Point-to-multipoint
  • Mesh
  • Broadcast

Each model describes different ways devices can connect and communicate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

What is an ‘evil twin’ in wireless network security?

A

A malicious access point that appears to be a legitimate network

Attackers use it to capture sensitive data from connected clients.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

What is a rogue access point?

A

An access point added to a network without authorization

It can provide attackers with a point of entry into the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

What are rogue access points?

A

APs added to your network either intentionally or unintentionally

They can offer a point of entry to attackers or unwanted users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

What is the purpose of wireless intrusion detection systems?

A

To continuously scan for unknown access points and determine if they are connected to your network

This involves combining wireless network testing with wired network logs and traffic information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

Define bluejacking.

A

Sending unsolicited messages to Bluetooth-enabled devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

What is bluesnarfing?

A

Unauthorized access to a Bluetooth device to gather information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q

What is a Bluetooth impersonation attack (BIA)?

A

Exploits weaknesses in Bluetooth specification, lacking mutual authentication

They have not yet been seen in the wild but pose a potential threat.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
81
Q

True or False: The security model for Bluetooth has significantly improved over the years.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
82
Q

What is disassociation in the context of wireless networks?

A

When a device disconnects from an access point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
83
Q

How do attackers typically force a device to disassociate?

A

By sending a deauthentication frame to the access point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
84
Q

What is the difference between Wi-Fi jammers and deauthers?

A

Deauthers send deauthentication frames; jammers send powerful traffic to drown out signals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
85
Q

What is sideloading?

A

Transferring files to a mobile device to install applications outside of the official app store

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
86
Q

What does jailbreaking allow a user to do?

A

Gain more access to a mobile device than is typically allowed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
87
Q

What is the purpose of conducting a site survey?

A

To determine existing networks and physical structure for access point placement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
88
Q

Fill in the blank: In the 2.4 GHz band, channels 1, 6, and 11 are used to avoid _______.

A

Overlap and interference

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
89
Q

What is the function of Wi-Fi analyzer software?

A

To gather data for surveying and planning networks, creating heatmaps, and identifying channels

90
Q

What is WPA2?

A

Wi-Fi Protected Access 2, a widely used security standard for wireless networks

91
Q

List the two major usage modes of WPA2.

A
  • WPA2-Personal
  • WPA2-Enterprise
92
Q

What encryption does CCMP use in WPA2?

A

Advanced Encryption Standard (AES)

93
Q

What is WPA3?

A

The replacement for WPA2, required to be supported in all Wi-Fi devices since mid-2020

94
Q

What feature does WPA3-Personal implement to enhance password-based authentication?

A

Simultaneous Authentication of Equals (SAE)

95
Q

Define perfect forward secrecy.

A

A process that changes encryption keys regularly to protect communication

96
Q

What is the main advantage of WPA3-Enterprise over WPA2?

A

Stronger encryption with an optional 192-bit security mode

97
Q

What is an open network?

A

A network that does not require authentication and often uses a captive portal

98
Q

Describe preshared keys (PSKs) in network authentication.

A

Require a shared passphrase for encryption but do not uniquely identify users

99
Q

What does enterprise authentication rely on?

A

A RADIUS server and utilizes 802.1X for authentication

100
Q

What is a captive portal?

A

A captive portal redirects traffic to a website or registration page before allowing access to the network

Captive portals often require users to provide information to gain access to open networks

101
Q

What is the risk associated with open networks?

A

Open networks do not provide encryption, leaving user data at risk unless traffic is sent via secure protocols like HTTPS

This means that sensitive information can be intercepted by malicious actors

102
Q

What does preshared keys (PSKs) require?

A

A passphrase or key that is shared with anyone who wants to use the network

This allows traffic to be encrypted but does not uniquely identify users

103
Q

What is enterprise authentication reliant on?

A

A RADIUS server and utilizes an Extensible Authentication Protocol (EAP) for authentication

104
Q

What is 802.1X?

A

An IEEE standard for access control used for both wired and wireless devices

In wireless networks, it integrates with RADIUS servers for user authentication

105
Q

What actions can be taken based on user information after authentication?

A

Users can be placed in groups or network zones or have other actions taken based on attributes

106
Q

What is the role of EAP in wireless networks?

A

EAP is used by 802.1X as part of the authentication process when devices authenticate to a RADIUS server

107
Q

Name a common EAP variant.

A

Protected EAP (PEAP)

Other variants include EAP-FAST, EAP-TLS, and EAP-TTLS

108
Q

How does Protected EAP (PEAP) enhance security?

A

Authenticates servers using a certificate and wraps EAP in a TLS tunnel for security

109
Q

What is the focus of EAP-FAST?

A

Providing faster reauthentication while devices are roaming

It improves on vulnerabilities in the Lightweight Extensible Authentication Protocol (LEAP)

110
Q

What does EAP-TLS implement?

A

Certificate-based authentication and mutual authentication of the device and network

111
Q

Fill in the blank: EAP-TTLS extends EAP-TLS and does not require client devices to have a _______.

A

certificate

112
Q

What is a concern for EAP-TTLS deployments?

A

It may require additional software to be installed on some devices

This can be a barrier compared to PEAP, which does not have this requirement

113
Q

What is RADIUS?

A

Remote Authentication Dial-in User Service

It is used for authenticating individuals to remote networks using their home organization’s accounts

114
Q

What is the purpose of federating RADIUS servers?

A

To allow individuals from other organizations to authenticate to remote networks using their home organization’s credentials

115
Q

What is eduroam?

A

A federated authentication service for wireless that allows users from any participating institution to authenticate and use networks

It is widely used in higher education

116
Q

What does the Security+ exam outline focus on?

A

WPA3, RADIUS, cryptographic protocols, and authentication protocols

It does not go into specifics about cryptographic protocols and authentication protocols

117
Q

What should you consider while preparing for the Security+ exam regarding WPA3?

A

The new security features of WPA3 and its improvements over WPA2

118
Q

What are the types of wireless networks commonly found in organizations?

A

Wi-Fi, Bluetooth, cellular, Zigbee

These networks differ in functionality and security challenges.

119
Q

What is the primary function of cellular networks?

A

Provide connectivity for mobile devices by dividing areas into ‘cells’ with tower coverage

Modern cellular networks use technologies like LTE and 5G.

120
Q

What are the key differences between 4G and 5G networks?

A

4G requires fewer antennas; 5G requires greater antenna density and provides greater bandwidth and throughput

5G networks also necessitate careful antenna placement in building designs.

121
Q

How is cellular connectivity typically provided?

A

By a cellular carrier rather than the organization itself

This means cellular networks are managed outside the organization’s control.

122
Q

What does Wi-Fi primarily rely on for wireless networking?

A

2.4 GHz and 5 GHz radio bands

Wi-Fi signals can be blocked by obstacles like walls or trees.

123
Q

List the current and historical Wi-Fi standards mentioned.

A
  • 802.11b
  • 802.11a
  • 802.11g
  • 802.11n
  • 802.11ac
  • 802.11ax
  • 802.11be

Each has its own maximum speed and frequency.

124
Q

What are the maximum speeds of 802.11ax and 802.11be?

A

802.11ax: 9.6 Gbit/s; 802.11be: 40+ Gbit/s

802.11be also supports multiple frequency bands.

125
Q

What security features do WPA2 and WPA3 provide?

A
  • Encryption options
  • Protection for network frames
  • Authentication options

These features help secure Wi-Fi networks.

126
Q

What is the typical range for Bluetooth connections?

A

Less than 100 meters, typically 5–30 meters

Bluetooth is designed for low-power, short-range connections.

127
Q

What are the four security modes of Bluetooth?

A
  • Security Mode 1: No security
  • Security Mode 2: Service-level enforced security
  • Security Mode 3: Link-level enforced security
  • Security Mode 4: Standard pairing with Security Simple Pairing

These modes determine the security level of Bluetooth connections.

128
Q

What types of RFID tags exist?

A
  • Active tags
  • Semi-active tags
  • Passive tags

Each type has different power sources and functionalities.

129
Q

What are the frequency ranges used by RFID tags?

A
  • Low-frequency
  • High-frequency
  • Ultra-high-frequency

Different ranges cater to various applications and distances.

130
Q

What is the primary function of GPS technology?

A

To provide positioning and navigation using a constellation of satellites

GPS can position devices within a foot of their actual location.

131
Q

True or False: GPS signals can be jammed or spoofed.

A

True

GPS jamming is illegal in the United States.

132
Q

What is NFC primarily used for?

A

Very short-range communication between devices

Commonly used in payment systems like Apple Pay and Google Pay.

133
Q

What are the characteristics of infrared (IR) networking?

A

Works in line of sight; supports low to gigabit speeds

IR networks are less common today, having been largely replaced by Bluetooth and Wi-Fi.

134
Q

What are the four major wireless connection models?

A
  • Point-to-point
  • Point-to-multipoint
  • Mesh
  • Broadcast

Each model describes different ways devices can connect and communicate.

135
Q

What is an ‘evil twin’ in wireless network security?

A

A malicious access point that appears to be a legitimate network

Attackers use it to capture sensitive data from connected clients.

136
Q

What is a rogue access point?

A

An access point added to a network without authorization

It can provide attackers with a point of entry into the network.

137
Q

What are rogue access points?

A

APs added to your network either intentionally or unintentionally

They can offer a point of entry to attackers or unwanted users.

138
Q

What is the purpose of wireless intrusion detection systems?

A

To continuously scan for unknown access points and determine if they are connected to your network

This involves combining wireless network testing with wired network logs and traffic information.

139
Q

Define bluejacking.

A

Sending unsolicited messages to Bluetooth-enabled devices

140
Q

What is bluesnarfing?

A

Unauthorized access to a Bluetooth device to gather information

141
Q

What is a Bluetooth impersonation attack (BIA)?

A

Exploits weaknesses in Bluetooth specification, lacking mutual authentication

They have not yet been seen in the wild but pose a potential threat.

142
Q

True or False: The security model for Bluetooth has significantly improved over the years.

143
Q

What is disassociation in the context of wireless networks?

A

When a device disconnects from an access point

144
Q

How do attackers typically force a device to disassociate?

A

By sending a deauthentication frame to the access point

145
Q

What is the difference between Wi-Fi jammers and deauthers?

A

Deauthers send deauthentication frames; jammers send powerful traffic to drown out signals

146
Q

What is sideloading?

A

Transferring files to a mobile device to install applications outside of the official app store

147
Q

What does jailbreaking allow a user to do?

A

Gain more access to a mobile device than is typically allowed

148
Q

What is the purpose of conducting a site survey?

A

To determine existing networks and physical structure for access point placement

149
Q

Fill in the blank: In the 2.4 GHz band, channels 1, 6, and 11 are used to avoid _______.

A

Overlap and interference

150
Q

What is the function of Wi-Fi analyzer software?

A

To gather data for surveying and planning networks, creating heatmaps, and identifying channels

151
Q

What is WPA2?

A

Wi-Fi Protected Access 2, a widely used security standard for wireless networks

152
Q

List the two major usage modes of WPA2.

A
  • WPA2-Personal
  • WPA2-Enterprise
153
Q

What encryption does CCMP use in WPA2?

A

Advanced Encryption Standard (AES)

154
Q

What is WPA3?

A

The replacement for WPA2, required to be supported in all Wi-Fi devices since mid-2020

155
Q

What feature does WPA3-Personal implement to enhance password-based authentication?

A

Simultaneous Authentication of Equals (SAE)

156
Q

Define perfect forward secrecy.

A

A process that changes encryption keys regularly to protect communication

157
Q

What is the main advantage of WPA3-Enterprise over WPA2?

A

Stronger encryption with an optional 192-bit security mode

158
Q

What is an open network?

A

A network that does not require authentication and often uses a captive portal

159
Q

Describe preshared keys (PSKs) in network authentication.

A

Require a shared passphrase for encryption but do not uniquely identify users

160
Q

What does enterprise authentication rely on?

A

A RADIUS server and utilizes 802.1X for authentication

161
Q

What is a captive portal?

A

A captive portal redirects traffic to a website or registration page before allowing access to the network

Captive portals often require users to provide information to gain access to open networks

162
Q

What is the risk associated with open networks?

A

Open networks do not provide encryption, leaving user data at risk unless traffic is sent via secure protocols like HTTPS

This means that sensitive information can be intercepted by malicious actors

163
Q

What does preshared keys (PSKs) require?

A

A passphrase or key that is shared with anyone who wants to use the network

This allows traffic to be encrypted but does not uniquely identify users

164
Q

What is enterprise authentication reliant on?

A

A RADIUS server and utilizes an Extensible Authentication Protocol (EAP) for authentication

165
Q

What is 802.1X?

A

An IEEE standard for access control used for both wired and wireless devices

In wireless networks, it integrates with RADIUS servers for user authentication

166
Q

What actions can be taken based on user information after authentication?

A

Users can be placed in groups or network zones or have other actions taken based on attributes

167
Q

What is the role of EAP in wireless networks?

A

EAP is used by 802.1X as part of the authentication process when devices authenticate to a RADIUS server

168
Q

Name a common EAP variant.

A

Protected EAP (PEAP)

Other variants include EAP-FAST, EAP-TLS, and EAP-TTLS

169
Q

How does Protected EAP (PEAP) enhance security?

A

Authenticates servers using a certificate and wraps EAP in a TLS tunnel for security

170
Q

What is the focus of EAP-FAST?

A

Providing faster reauthentication while devices are roaming

It improves on vulnerabilities in the Lightweight Extensible Authentication Protocol (LEAP)

171
Q

What does EAP-TLS implement?

A

Certificate-based authentication and mutual authentication of the device and network

172
Q

Fill in the blank: EAP-TTLS extends EAP-TLS and does not require client devices to have a _______.

A

certificate

173
Q

What is a concern for EAP-TTLS deployments?

A

It may require additional software to be installed on some devices

This can be a barrier compared to PEAP, which does not have this requirement

174
Q

What is RADIUS?

A

Remote Authentication Dial-in User Service

It is used for authenticating individuals to remote networks using their home organization’s accounts

175
Q

What is the purpose of federating RADIUS servers?

A

To allow individuals from other organizations to authenticate to remote networks using their home organization’s credentials

176
Q

What is eduroam?

A

A federated authentication service for wireless that allows users from any participating institution to authenticate and use networks

It is widely used in higher education

177
Q

What does the Security+ exam outline focus on?

A

WPA3, RADIUS, cryptographic protocols, and authentication protocols

It does not go into specifics about cryptographic protocols and authentication protocols

178
Q

What should you consider while preparing for the Security+ exam regarding WPA3?

A

The new security features of WPA3 and its improvements over WPA2

179
Q

What does BYOD stand for?

A

Bring Your Own Device

180
Q

What are the advantages of BYOD?

A
  • More user freedom
  • Lower cost to the organization
181
Q

What is a disadvantage of BYOD?

A

Greater risk since the organization does not control, secure, or manage the device

182
Q

What does CYOD stand for?

A

Choose Your Own Device

183
Q

In a CYOD model, who owns the device?

A

The organization

184
Q

What is the main advantage of the COPE model?

A

Allows reasonable personal use while meeting enterprise security and control needs

185
Q

What does COBO stand for?

A

Company-Owned Business Only

186
Q

What is the key feature of COBO devices?

A

Used only for business work with no personal use

187
Q

What is Virtual Desktop Infrastructure (VDI)?

A

A technology that allows low-security devices to access a secured, managed environment

188
Q

What is mobile device hardening?

A

The process of securing mobile devices to resist threats

189
Q

Name two benchmarks available for mobile device hardening.

A
  • iOS benchmark
  • Android benchmark
190
Q

What is a key practice in hardening mobile devices?

A

Updating and patching the OS

191
Q

What is the function of remote wipe capability?

A

Used to erase data on a device when lost or stolen

192
Q

True or False: Remote wipe can only wipe organizational data and applications.

193
Q

What does MDM stand for?

A

Mobile Device Management

194
Q

What is the main purpose of MDM tools?

A

To manage mobile devices and ensure data security

195
Q

What does UEM stand for?

A

Unified Endpoint Management

196
Q

What is the difference between MDM and UEM?

A

MDM focuses on mobile devices, while UEM integrates management of various devices including desktops and laptops

197
Q

What are application management features in MDM?

A
  • Deploying specific applications
  • Limiting application installations
  • Monitoring application usage
198
Q

What is content management in the context of mobile devices?

A

Ensures secure access and control of organizational files on mobile devices

199
Q

What is geolocation used for in mobile device management?

A

To make decisions about device operation based on its location

200
Q

What is the purpose of screen locks, passwords, and PINs?

A

To prevent unauthorized access to mobile devices

201
Q

What are biometrics in mobile devices?

A

Authentication methods like fingerprints and facial recognition

202
Q

What is context-aware authentication?

A

Authentication that considers user behavior and context, such as location and usage patterns

203
Q

What does containerization do for mobile devices?

A

Separates work and personal-use contexts to reduce risk of data exposure

204
Q

What is full-device encryption (FDE)?

A

A security measure to protect data on lost or stolen devices

205
Q

What is the benefit of push notifications in MDM?

A

To alert users or communicate important messages from a central location

206
Q

What is the role of storage segmentation?

A

To keep personal and business data separate on mobile devices

207
Q

What is the impact of rooting or jailbreaking a device?

A

Allows users to bypass security controls and install unauthorized software

208
Q

What are some controls organizations may implement for wireless connectivity?

A
  • Limiting Wi-Fi network connections
  • Preventing ad hoc networks
  • Disabling tethering
209
Q

What are some features MDM tools may include?

A
  • Per-application VPN
  • Onboarding tools for BYOD
  • Advanced threat detection
210
Q

What is a challenge of managing mobile devices?

A

Variability between hardware manufacturers and operating system limitations

211
Q

Fill in the blank: The _______ model provides the greatest control but the least flexibility.

A

Fully corporate-owned

212
Q

What is one of the key best practices recommended by the NSA for mobile device security?

A

Implementing strong authentication measures

213
Q

What are the three key wireless connectivity options that organizations may deploy?

A

Wi-Fi, cellular, and Bluetooth

These technologies are essential for connecting devices and systems.

214
Q

Why is it important to understand common attacks against wireless networks?

A

It helps security professionals design a secure wireless network

Understanding potential attacks informs better security measures.

215
Q

What role do site surveys play in network design?

A

They help understand the environment where the network will be deployed

Site surveys can include heatmaps to visualize signal propagation.

216
Q

What do heatmaps in the context of network design show?

A

Signal propagation

Heatmaps assist in determining optimal device placement.

217
Q

What are some concerns when protecting controllers and access points?

A

Patching, maintenance, and secure remote access

Protecting these components is crucial for overall network security.

218
Q

What does WPA3 provide in terms of authentication?

A

Simultaneous authentication of equals (SAE) and enterprise models

Enterprise models connect to RADIUS servers for organizational credentials.

219
Q

What are EAP and its variants used for?

A

Authentication protocols

They allow choices based on hardware support and specific authentication needs.

220
Q

What are the two main deployment models for mobile devices?

A

BYOD processes and corporate-owned models

BYOD allows users to bring their own devices, while corporate models deploy locked-down devices.

221
Q

What is the purpose of mobile device management tools?

A

To manage and secure mobile devices

MDM tools provide a range of features necessary for security professionals.