13 - Wireless and Mobile Security Flashcards
Given scenarios, install and configure wireless security settings and implement mobile solutions
Alyssa wants to use her Android phone to store and manage cryptographic certificates. What type of solution could she choose to do this using secure hardware?
A MicroSD HSM
Fred’s company issues devices in a BYOD model. That means Fred wants to ensure that corporate data and applications are kept separate from personal applications on the devices. What tech is best suited to meet this need?
Containerization
Michelle has deployed iPads to her staff who work the factory floor. She wants to ensure that the devices work on in the factory and that if they are taken home, they cannot access business data or services. What type of solution is best suited to her needs?
Geofencing
Which wireless technology is frequently used for door access cards?
Radio Frequency Identification (RFID)
During a site survey, Chris discovers that there are more access points broadcasting his org’s SSID than he expects there to be. What type of wireless attack has he likely discovered?
An Evil Twin
Daniel knows that WPA3 has added a method to ensure that brute-force attacks against weak pre-shared keys are less likely to succeed. What is this tech called?
Simultaneous Authentication of Equals (SAE)
Isabelle needs to select the EAP protocol that she will use with her wireless network. She wants to use a secure protocol that does not require client devices to have a certificate, but she does want to require mutual authentication. Which protocol should she use?
PEAP
Theresa has implemented tech that keeps data for personal use separate from data for her company on mobile devices used by members of her staff. What is this concept called?
Storage Segmentation
What standard allows USB devices like cameras, keyboards, and flash drives to be plugged into mobile devices and used as they normally would be?
USB on the go -or- USB OTG
Madhuri disables SMS, MMS, and RCS on phones in her org. What has she prevented from being sent?
Text messages and multimedia messages
What is the most frequent concern that leads to GPS tagging being disabled by some companies via an MDM tool?
Privacy Concerns
Bart knows that there are two common connection methods between Wi-Fi devices. Which of the following best describes Ad Hoc Mode?
Point-to-Point
Susan wants to ensure that the threat of a lost phone creating a data breach is minimized. What two technologies should she implement to do this?
Remote Wipe and Full Device Encryption (FDE)
What are the two most commonly deployed biometric authentication solutions for mobile devices?
Face and Fingerprint Recognition
Alaina has implemented WPA2 and uses enterprise authentication for access points in infrastructure mode. What encryption protocol is her network using?
CCMP