Securing Wireless and Mobile Devices
Safeguarding wireless and mobile technology
Securing wireless and mobile devices requires a comprehensive approach addressing multiple vulnerabilities. For wireless networks, implement WPA3 encryption which provides stronger protection than older protocols like WEP or WPA. Configure robust pre-shared keys (PSK) or use enterprise authenticati…
CompTIA Security+ - Securing Wireless and Mobile Devices Example Questions
Test your knowledge of Securing Wireless and Mobile Devices
Question 1
A marketing event team has Bluetooth beacons that broadcast promotional information to passersby. However, a competitor has been exploiting weaknesses in the beacons. Which security measure should be implemented to increase security?
Question 2
Your company's MDM policy does not allow employees to use their own mobile devices for work. However, some employees still use their personal devices for sensitive activities. What MDM solution should be implemented?
Question 3
A company's employees are given access to their work email on their personal smartphones. Which security policy would be most effective in preventing unauthorized access to these emails?