O'Reilly logo

CompTIA® Security+™: Study Guide, Fifth Edition by Emmett Dulaney

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Understanding Mobile Devices

Mobile devices, including smartphones, e-readers, tablet computers, and personal digital assistants (PDAs), are popular. Many of these devices use either RF signaling or cellular technologies for communication. Figure 12-5, for example, shows an Amazon Kindle looking for wireless networks.

Figure 12-5: Wireless scanning is done by a wide variety of devices such as the Kindle.

f1205.tif

If the device uses the Wireless Application Protocol (WAP), the device in all likelihood doesn’t have security enabled. Several levels of security exist in WAP:

Anonymous Authentication This allows virtually anyone to connect to the wireless ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required