13 - Wireless and Mobile Security Flashcards
Given scenarios, install and configure wireless security settings and implement mobile solutions
Alyssa wants to use her Android phone to store and manage cryptographic certificates. What type of solution could she choose to do this using secure hardware?
A MicroSD HSM
Fred’s company issues devices in a BYOD model. That means Fred wants to ensure that corporate data and applications are kept separate from personal applications on the devices. What tech is best suited to meet this need?
Containerization
Michelle has deployed iPads to her staff who work the factory floor. She wants to ensure that the devices work on in the factory and that if they are taken home, they cannot access business data or services. What type of solution is best suited to her needs?
Geofencing
Which wireless technology is frequently used for door access cards?
Radio Frequency Identification (RFID)
During a site survey, Chris discovers that there are more access points broadcasting his org’s SSID than he expects there to be. What type of wireless attack has he likely discovered?
An Evil Twin
Daniel knows that WPA3 has added a method to ensure that brute-force attacks against weak pre-shared keys are less likely to succeed. What is this tech called?
Simultaneous Authentication of Equals (SAE)
Isabelle needs to select the EAP protocol that she will use with her wireless network. She wants to use a secure protocol that does not require client devices to have a certificate, but she does want to require mutual authentication. Which protocol should she use?
PEAP
Theresa has implemented tech that keeps data for personal use separate from data for her company on mobile devices used by members of her staff. What is this concept called?
Storage Segmentation
What standard allows USB devices like cameras, keyboards, and flash drives to be plugged into mobile devices and used as they normally would be?
USB on the go -or- USB OTG
Madhuri disables SMS, MMS, and RCS on phones in her org. What has she prevented from being sent?
Text messages and multimedia messages
What is the most frequent concern that leads to GPS tagging being disabled by some companies via an MDM tool?
Privacy Concerns
Bart knows that there are two common connection methods between Wi-Fi devices. Which of the following best describes Ad Hoc Mode?
Point-to-Point
Susan wants to ensure that the threat of a lost phone creating a data breach is minimized. What two technologies should she implement to do this?
Remote Wipe and Full Device Encryption (FDE)
What are the two most commonly deployed biometric authentication solutions for mobile devices?
Face and Fingerprint Recognition
Alaina has implemented WPA2 and uses enterprise authentication for access points in infrastructure mode. What encryption protocol is her network using?
CCMP
Jerome wants to allow guests to use his org’s wireless network, but he does not want to provide a pre-shared key. What solution can he deploy to gather information such as email addresses or other contact info before allowing users to access his open network?
A Captive Portal
Amanda wants to create a view of her buildings that shows wi-fi signal strength and coverage. What is this type of view called?
A Heatmap
Laura wants to deploy a WPA2 secured wireless for her small business, but she doesn’t have a RADIUS server set up. If she wants her Wi-Fi to be encrypted, what is her best option for wireless authentication?
Pre-shared Key (PSK)
Gurvinder wants to select a mobile device deployment method that provides employees with devices that they can use as though they’re personally owned to maximize flexibility and ease of use. What deployment model should he select?
Corporate-Owned, Personally-Enabled (COPE)
Octavia discovers that the contact list from her phone has been acquired via a wireless attack. Which of the following is the MOST likely culprit?
- Bluejacking
- An evil maid
- Bluesnarfing
- An evil twin
Bluesnarfing