Section 8: Securing Wireless and Mobile Solutions Flashcards

1
Q

What two groups of people might use a guest wireless network?

A
  1. Visitors
  2. Employees on their lunch break
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the difference between fat and thin wireless controllers?

A

Fat: standalone, has its own setting and DHCP addresses configured locally.

Thin: Pushes out the setting to multiple WAPs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the WAP master password, and how would you protect it?

A

The admin password. Should be encrypted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What two tasks can a Wi-Fi Analyzer perform?

A
  1. Troubleshoot wireless connectivity
  2. Discover a disabled SSID, which is inside a packet going to the WAP.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the purpose of MAC filtering?

A

Controls who can access a WAP. If your MAC address is not added to the WAP, then you are denied access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Why should you place you first WAP on channel 1, your second WAP on channel 11, and you third WAP on channel 6?

A

To prevent interference by overlapping the wireless channels.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Why would an engineer carry out a site survey before installing a wireless network?

A

To ensure that the WAPs are placed where there is no interference.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Would you use online banking if you were in a hotel that uses Open Authentication? If not, what would you do instead?

A

No, because it is not secure. You could tether your 4G phone and then open a VPN connection to the bank.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the weakest version of wireless encryption?

A

WEP. Only has 40-bit encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

If a friend comes to visit you in your house and asks for the wireless password, what are you given them?

A

The Pre-Shared Key (PSK).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the most secure version of WPA2?

A

WPA2-CCMP. It uses AES encryption that is 128 bits.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

When using WPA3-Personal, what replaces the pre-shared key?

A

Simultaneous Authentication of Equals (SAE). It is more secure as the password is never transmitted and is immune to offline attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

When using WPA3 wireless, what replaces WPA2-Open Authentication?

A

WiFi Enhanced Open. Does not use a password and prevents eavesdropping.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the most secure version of wireless?

A

WAP3. Uses AES encryption up to 256 bit. WPA2 only uses 128 bit encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How do you access a wireless network if you use WPS, and what type of attack is it vulnerable against?

A

With WPS, you push the button to connect. Susceptible to a brute-force attack as it has a password stored on the device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the purpose of a captive portal for a wireless network?

A

Can ask you to agree to an AUP and provide additional validation like email address/Facebook/Google account details. Can handle billing for premium connections.

17
Q

What benefit does WPA3 bring to IoT devices?

A

WiFi Easy Connect makes it easy to connect IoT devices like smartphones by using a QR code.

18
Q

What needs to be installed on the endpoint if you are going to use EAP-TLS for wireless authentication?

A

A x509 certificate.

19
Q

If a user installs pirate software on their corporate laptop, which policy have they violated?

A

Acceptable Use Policy (AUP).

20
Q

What would be the benefit of first-line support if the company were to adopt CYOD instead of BYOD?

A

There would be a limited number of devices to make support easier.

21
Q

If you are staying in a hotel and their Wi-Fi is not working, how can you get access to the internet?

A

Use cellular phone as a hotspot.

22
Q

If your cell phone has been lost or stolen, what should be done using MDM?

A

Remote wipe.

23
Q

What three things should you do to protect the data stored on your smartphone?

A
  1. Screen locks
  2. Strong passwords
  3. FDE
24
Q

If a company has suffered several thefts of company laptops, what could you use to prevent further thefts?

A

Tag the laptops, set up geofencing, RFID

25
Q

How can you prevent company data separate from personal data on a cell phone that is being used as a BYOD device so that offboarding is easy to achieve?

A

Storage segmentation or containerization.

26
Q

What is the purpose of SE Android?

A

To segment business data and prevent applications outside of the Knox container from accessing resources inside the container.

27
Q

What is a wireless short-range payment type?

A

Near-Field Communication (NFC).