13 - Wireless and Mobile Security Flashcards

Given scenarios, install and configure wireless security settings and implement mobile solutions

1
Q

Alyssa wants to use her Android phone to store and manage cryptographic certificates. What type of solution could she choose to do this using secure hardware?

A

A MicroSD HSM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Fred’s company issues devices in a BYOD model. That means Fred wants to ensure that corporate data and applications are kept separate from personal applications on the devices. What tech is best suited to meet this need?

A

Containerization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Michelle has deployed iPads to her staff who work the factory floor. She wants to ensure that the devices work on in the factory and that if they are taken home, they cannot access business data or services. What type of solution is best suited to her needs?

A

Geofencing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which wireless technology is frequently used for door access cards?

A

Radio Frequency Identification (RFID)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

During a site survey, Chris discovers that there are more access points broadcasting his org’s SSID than he expects there to be. What type of wireless attack has he likely discovered?

A

An Evil Twin

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Daniel knows that WPA3 has added a method to ensure that brute-force attacks against weak pre-shared keys are less likely to succeed. What is this tech called?

A

Simultaneous Authentication of Equals (SAE)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Isabelle needs to select the EAP protocol that she will use with her wireless network. She wants to use a secure protocol that does not require client devices to have a certificate, but she does want to require mutual authentication. Which protocol should she use?

A

PEAP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Theresa has implemented tech that keeps data for personal use separate from data for her company on mobile devices used by members of her staff. What is this concept called?

A

Storage Segmentation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What standard allows USB devices like cameras, keyboards, and flash drives to be plugged into mobile devices and used as they normally would be?

A

USB on the go -or- USB OTG

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Madhuri disables SMS, MMS, and RCS on phones in her org. What has she prevented from being sent?

A

Text messages and multimedia messages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the most frequent concern that leads to GPS tagging being disabled by some companies via an MDM tool?

A

Privacy Concerns

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Bart knows that there are two common connection methods between Wi-Fi devices. Which of the following best describes Ad Hoc Mode?

A

Point-to-Point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Susan wants to ensure that the threat of a lost phone creating a data breach is minimized. What two technologies should she implement to do this?

A

Remote Wipe and Full Device Encryption (FDE)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the two most commonly deployed biometric authentication solutions for mobile devices?

A

Face and Fingerprint Recognition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Alaina has implemented WPA2 and uses enterprise authentication for access points in infrastructure mode. What encryption protocol is her network using?

A

CCMP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Jerome wants to allow guests to use his org’s wireless network, but he does not want to provide a pre-shared key. What solution can he deploy to gather information such as email addresses or other contact info before allowing users to access his open network?

A

A Captive Portal

17
Q

Amanda wants to create a view of her buildings that shows wi-fi signal strength and coverage. What is this type of view called?

A

A Heatmap

18
Q

Laura wants to deploy a WPA2 secured wireless for her small business, but she doesn’t have a RADIUS server set up. If she wants her Wi-Fi to be encrypted, what is her best option for wireless authentication?

A

Pre-shared Key (PSK)

19
Q

Gurvinder wants to select a mobile device deployment method that provides employees with devices that they can use as though they’re personally owned to maximize flexibility and ease of use. What deployment model should he select?

A

Corporate-Owned, Personally-Enabled (COPE)

20
Q

Octavia discovers that the contact list from her phone has been acquired via a wireless attack. Which of the following is the MOST likely culprit?

  • Bluejacking
  • An evil maid
  • Bluesnarfing
  • An evil twin
A

Bluesnarfing