100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

WGU C844 Task 2: Securing WLAN & Mobile Environments at Alliah Company with Complete Solution | Update

Rating
-
Sold
-
Pages
3
Grade
A+
Uploaded on
18-09-2025
Written in
2025/2026

WGU C844 Task 2: Securing WLAN & Mobile Environments at Alliah Company with Complete Solution | Update









Whoops! We can’t load your doc right now. Try again or contact support.

Document information

Uploaded on
September 18, 2025
Number of pages
3
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

WGU C844 Task 2: Securing WLAN & Mobile
Environments at Alliah Company with Complete Solution |
2025-2026 Update

GRP1 Task 2

Securing WLAN and Mobile Environments at Alliah Company

A. Vulnerabilities: WLAN

1. Insecure BYOD Connections: Alliah's bring-your-own-device (BYOD) policy introduces
risks due to the lack of centralized control over employee-owned devices. These devices
may lack essential security features like updated firmware, antivirus software, or strong
passwords, making the wireless network vulnerable to malware infections and
unauthorized access.
2. Inadequate Wireless Encryption and Access Point Exposure: While Alliah has deployed
seven access points (APs), including one on a large back patio, the physical exposure of
APs outside the building may allow unauthorized users to attempt access. If encryption
protocols like WPA2/WPA3 are not enforced properly, attackers could intercept sensitive
communications via packet sniffing or launch man-in-the-middle attacks.




B. Vulnerabilities: Mobile

1. Unsecured Mobile Device Access: The five account representatives frequently travel and
access company data using laptops, tablets, and smartphones. If these mobile devices
lack full-disk encryption or secure remote-wipe capabilities, the loss or theft of a device
could lead to data breaches involving sensitive company or customer information.
2. Public Wi-Fi Usage Without VPN: When on the road, representatives likely connect to
public Wi-Fi networks in hotels, airports, or cafes. Without enforced VPN use, this
introduces risk of session hijacking, data interception, and exposure to rogue access
points set up by malicious actors.




C. Steps to Mitigate Vulnerabilities
Vulnerability Mitigation Steps Tools/Documentation

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
StudySet Chamberlain College Of Nursing
View profile
Follow You need to be logged in order to follow users or courses
Sold
2539
Member since
5 year
Number of followers
1734
Documents
16840
Last sold
14 hours ago
STUDYSET WILL HELP YOU EARN A TOP SCORE ON YOUR EXAMS

avoid resits and achieve higher grades with Aplus satisfying exams,study guide,class notes and textbook notes

4.0

605 reviews

5
312
4
106
3
97
2
26
1
64

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions