lOMoAR cPSD| 6861666
WGU C844 Task 2: Analyzing WLAN and Mobile Device
Vulnerabilities in Cybersecurity with Complete Solution
100% Correct | 2025 Update
Emerging Technologies in Cybersecurity
2/5/2025
Getting Started Task 2 Template
Use the template outline below to capture the rubric requirements and key points
and to serve as your task report. After you have captured the appropriate data,
massage each section into the required number of paragraphs and ensure you
have captured all the required points highlighted.
A. WLAN Vulnerabilities
First vulnerability for WLAN
(Examples can be found in chapter 4 of course material)
One vulnerability is the WLAN may be using weak encryption
protocols, which could make it vulnerable to brute force attacks, and
other malicious attacks. This is concerning because of the company’s
BYOD policy.
Second vulnerability for WLN
(Examples can be found in chapter 4 of the course material)
Another vulnerability is the possibility of rogue access points that could
be set up by attackers, which could create unauthorized entry points into
, lOMoAR cPSD| 6861666
the network. This poses a significant risk as it could result in data
breaches or unauthorized access to confidential information.
B Mobile Vulnerabilities
First vulnerability for Mobile devices
(Examples can be found in chapter 4 of the course material)
One major vulnerability stems from unsecured BYOD devices. Personal
devices used under the BYOD policy may lack proper security
measures, such as encryption, antivirus, or passcodes. This makes them
easy targets for malware or data theft.
Second vulnerability for Mobile devices
(Examples can be found in chapter 4 of the course material)
Another vulnerability could be employees using public Wi-Fi when
working with company data. For example, accessing corporate data over
public Wi-Fi without encryption increases the risk of exposure.
C. Mitigation
First Mitigation for WLAN
And steps, tools, and documentation (citation)
First, upgrading to WPA3 encryption is recommended, as it provides
stronger protection against brute force attacks and vulnerabilities. This
can be achieved by updating the firmware on all wireless access points
and configuring them to enforce WPA3 encryption for both personal and
enterprise networks (WPA3 Security Enhancements for Access Points.).
To detect and prevent unauthorized access points, deploying a Wireless
WGU C844 Task 2: Analyzing WLAN and Mobile Device
Vulnerabilities in Cybersecurity with Complete Solution
100% Correct | 2025 Update
Emerging Technologies in Cybersecurity
2/5/2025
Getting Started Task 2 Template
Use the template outline below to capture the rubric requirements and key points
and to serve as your task report. After you have captured the appropriate data,
massage each section into the required number of paragraphs and ensure you
have captured all the required points highlighted.
A. WLAN Vulnerabilities
First vulnerability for WLAN
(Examples can be found in chapter 4 of course material)
One vulnerability is the WLAN may be using weak encryption
protocols, which could make it vulnerable to brute force attacks, and
other malicious attacks. This is concerning because of the company’s
BYOD policy.
Second vulnerability for WLN
(Examples can be found in chapter 4 of the course material)
Another vulnerability is the possibility of rogue access points that could
be set up by attackers, which could create unauthorized entry points into
, lOMoAR cPSD| 6861666
the network. This poses a significant risk as it could result in data
breaches or unauthorized access to confidential information.
B Mobile Vulnerabilities
First vulnerability for Mobile devices
(Examples can be found in chapter 4 of the course material)
One major vulnerability stems from unsecured BYOD devices. Personal
devices used under the BYOD policy may lack proper security
measures, such as encryption, antivirus, or passcodes. This makes them
easy targets for malware or data theft.
Second vulnerability for Mobile devices
(Examples can be found in chapter 4 of the course material)
Another vulnerability could be employees using public Wi-Fi when
working with company data. For example, accessing corporate data over
public Wi-Fi without encryption increases the risk of exposure.
C. Mitigation
First Mitigation for WLAN
And steps, tools, and documentation (citation)
First, upgrading to WPA3 encryption is recommended, as it provides
stronger protection against brute force attacks and vulnerabilities. This
can be achieved by updating the firmware on all wireless access points
and configuring them to enforce WPA3 encryption for both personal and
enterprise networks (WPA3 Security Enhancements for Access Points.).
To detect and prevent unauthorized access points, deploying a Wireless