Mobile Computing Deployment and Management Real World Skills for Comptia Mobility+™ Certification and Beyond

Total Page:16

File Type:pdf, Size:1020Kb

Mobile Computing Deployment and Management Real World Skills for Comptia Mobility+™ Certification and Beyond Mobile Computing Deployment and Management Real World Skills for CompTIA Mobility+™ Certification and Beyond Robert J. Bartz ffi rs.indd 0½ 3/2015 Page i Acquisitions Editor: Kenyon Brown Development Editor: Kelly Talbot Technical Editor: Denny Hughes Production Editor: Christine O’Connor Copy Editor: Judy Flynn Editorial Manager: Pete Gaughan Production Manager: Kathleen Wisor Associate Publisher: Jim Minatel Media Supervising Producer: Richard Graves Book Designers: Judy Fung and Bill Gibson Proofreader: Josh Chase, Word One New York Indexer: Ted Laux Project Coordinator: Patrick Redmond Cover Designer: Wiley Copyright © 2015 by John Wiley & Sons, Inc., Indianapolis, Indiana Published simultaneously in Canada ISBN: 978-1-118-82461-0 ISBN: 978-1-118-82464-1 (ebk.) ISBN: 978-1-118-82466-5 (ebk.) No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 646-8600. Requests to the Publisher for permission should be addressed to the Permissions Department, John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030, (201) 748-6011, fax (201) 748-6008, or online at http://www.wiley.com/go/per- missions. Limit of Liability/Disclaimer of Warranty: The publisher and the author make no representations or warranties with respect to the accuracy or completeness of the contents of this work and specifically disclaim all warranties, including without limitation warranties of fitness for a particular purpose. No warranty may be created or extended by sales or promotional materials. The advice and strategies contained herein may not be suitable for every situation. This work is sold with the understanding that the publisher is not engaged in rendering legal, accounting, or other professional services. If professional assistance is required, the services of a competent professional person should be sought. Neither the publisher nor the author shall be liable for damages arising herefrom. The fact that an organization or Web site is referred to in this work as a citation and/or a potential source of further information does not mean that the author or the publisher endorses the information the organization or Web site may provide or recommendations it may make. Further, readers should be aware that Internet Web sites listed in this work may have changed or disappeared between when this work was written and when it is read. For general information on our other products and services or to obtain technical support, please contact our Customer Care Department within the U.S. at (877) 762-2974, outside the U.S. at (317) 572-3993 or fax (317) 572-4002. Wiley publishes in a variety of print and electronic formats and by print-on-demand. Some material included with standard print versions of this book may not be included in e-books or in print-on-demand. If this book refers to media such as a CD or DVD that is not included in the version you purchased, you may download this material at http://booksupport.wiley.com. For more information about Wiley products, visit www.wiley.com. Library of Congress Control Number: 2014937183 TRADEMARKS: Wiley, the Wiley logo, and the Sybex logo are trademarks or registered trademarks of John Wiley & Sons, Inc. and/or its affiliates, in the United States and other countries, and may not be used without written permission. CompTIA and Mobility+ are trademarks or registered trademarks of CompTIA Properties LLC. All other trademarks are the property of their respective owners. John Wiley & Sons, Inc. is not associated with any product or vendor mentioned in this book. 10 9 8 7 6 5 4 3 2 1 ffi rs.indd 0½ 3/2015 Page ii Acknowledgments I would like to thank my wife for her support and patience during the many, many hours that were dedicated to writing this book. Even though our two adult children are grown and out of the house, I know they were thinking about me writing and cheering me on during the entire process, even with their busy schedules. I would also like to thank everyone at Sybex who helped with the creation of this book, including acquisitions editors Jeff Kellum and Kenyon Brown, production editor Christine O’Connor, copy editor Judy Flynn, editorial assistant Connor O’Brien, and editorial man- ager Pete Gaughan. I owe all these individuals a lot of gratitude for their patience with me and the several delays encountered while working with me on this book. The developmen- tal editor for this book is Kelly Talbot. Many thanks go to Kelly for his time and his work in helping with the fl ow, organization, and suggestions that allowed me to make this book an easy read. His editorial skills and attention to detail were an enormous help to me. The technical editor for this book is Denny Hughes. I want to thank Denny for his timely reviews, comments, and suggestions that helped make this book a nice read and a valuable reference source. His many years of experience as a technical trainer, engineer, and content developer were a great contribution in creating a book I am sure you will enjoy reading. A special thank you goes to contributing author Sebastian Coe for his help with Chapter 17. Sebastian’s expertise in information systems security was instrumental in his contribution. I would also like to thank the thousands of students who have taken the time to attend the computer networking classes that I have had the opportunity to teach over the past 20 years. Educating, mentoring, and entertaining so many of these individuals gave me the inspiration to author this and other books about wireless networking. Finally, I would like to thank the manufacturers, vendors, organizations, and individu- als that provided the subject matter, allowing me access to the technology and tools needed to write this book: AirMagnet/Fluke Networks (www.flukenetworks.com) Cloudpath Networks (cloudpath.net) CradlePoint (www.cradlepoint.com) Ekahau (www.ekahau.com) IEEE (www.ieee.org) L-com Global Connectivity (www.l-com.com) MetaGeek (www.metageek.net) Ruckus Wireless (www.ruckuswireless.com) SolarWinds (www.solarwinds.com) TamoSoft (www.tamos.com) Wi-Fi Alliance (www.wi-fi.org) About the Author Robert J. Bartz is an engineer, technical instructor, and computer networking consultant. He is a graduate of California State University, Long Beach, College of Engineering, with a Bachelor of Science degree in Industrial Technology. Prior to becoming a computer net- working engineer and technical instructor, Robert was employed as an aerospace test engi- neer working with aircraft radar systems and satellite communications. He has attained many technical certifi cations over the years, including Master Certifi ed Novell Engineer (MCNE), Master Certifi ed Novell Instructor (MCNI), Microsoft Certifi ed Systems Engineer (MCSE), Microsoft Certifi ed Trainer (MCT), Certifi ed Wireless Network Trainer (CWNT), Certifi ed Wireless Network Expert (CWNE), and CompTIA Mobility+, to name a few. He has over 25 years’ experience with computers and computer networking technology. Robert has taught computer and wireless networking technology to thousands of people from various industries and markets across the United States and abroad. He is the founder of Eight-O-Two Technology Solutions, LLC, a computer networking technical training and consulting services company that provides technical education and computer network- ing services. He spends his spare time learning new technology, having fun outside, and enjoying the beauty of his surroundings at his home in Colorado. ffi rs.indd 0½ 3/2015 Page v Contents at a Glance Introduction xxvii Chapter 1 Computer Network Types, Topologies, and the OSI Model 1 Chapter 2 Common Network Protocols and Ports 29 Chapter 3 Radio Frequency and Antenna Technology Fundamentals 75 Chapter 4 Standards and Certifications for Wireless Technology 145 Chapter 5 IEEE 802.11 Terminology and Technology 183 Chapter 6 Computer Network Infrastructure Devices 253 Chapter 7 Cellular Communication Technology 299 Chapter 8 Site Survey, Capacity Planning, and Wireless Design 319 Chapter 9 Understanding Network Traffic Flow and Control 409 Chapter 10 Introduction to Mobile Device Management 441 Chapter 11 Mobile Device Policy, Profiles, and Configuration 461 Chapter 12 Implementation of Mobile Device Technology 479 Chapter 13 Mobile Device Operation and Management Concepts 509 Chapter 14 Mobile Device Technology Advancements, Requirements, and Application Configuration 531 Chapter 15 Mobile Device Security Threats and Risks 559 Chapter 16 Device Authentication and Data Encryption 577 Chapter 17 Security Requirements, Monitoring, and Reporting 601 Chapter 18 Data Backup, Restore, and Disaster Recovery 625 Chapter 19 Mobile Device Problem Analysis and Troubleshooting 647 Appendix The CompTIA Mobility+ Certification Exam 669 Index 689 ffi rs.indd 0½ 3/2015 Page vii Contents Introduction xxvii Chapter 1 Computer Network Types, Topologies, and the OSI Model 1 Network Types 2 The Local Area Network 3 The Wide Area Network 3 The Metropolitan Area Network 5 The Campus Area Network 5 The Personal Area Network 6 Network Topologies 7 The Bus Topology 8 The Ring Topology 9 The Star Topology 10 The Mesh Topology
Recommended publications
  • Blackberry UEM Architecture and Data Flows
    BlackBerry UEM Architecture and Data Flow Reference 12.10 2018-11-28Z | | 2 Contents BlackBerry UEM Architecture and data flows.................................................... 5 Architecture: BlackBerry UEM solution.................................................................................................................5 BlackBerry UEM components............................................................................ 7 BlackBerry UEM distributed installation.......................................................... 10 BlackBerry UEM regional deployment............................................................. 13 Components used to manage BlackBerry OS devices......................................17 Activating devices...........................................................................................20 Data flow: Activating a BlackBerry 10 device....................................................................................................20 Data flow: Activating an Android device for MDM............................................................................................22 Data flow: Activating an Android Enterprise device in a Google domain........................................................ 24 Data flow: Activating an Android Enterprise device using a managed Google Play account......................... 25 Data flow: Activating an Android device to have only a work profile in a Google domain..............................27 Data flow: Activating an Android device to have only a work profile using
    [Show full text]
  • The Government of Ontario
    The Government of Ontario Good Control v2.3.53.62 • Good Proxy v2.3.53.69 • GEMS v2.2.22.25 The Government of Ontario Contents Preface .......................................................................................................................................................................................... 5 Good for BlackBerry ............................................................................................................................................................... 6 About Blackberry Enterprise Server (BES) 12 ............................................................................................................. 6 Installing BlackBerry Enterprise Server 12 (BES 12)................................................................................................ 6 The Government of Ontario BES12 Environment ...................................................................................................... 7 Unique BES12 Installation Conditions ........................................................................................................................ 7 Key Points of the BES12 Installations ............................................................................................................................. 8 Set the NIC Binding Order ................................................................................................................................................... 8 Stop all network interfaces ...........................................................................................................................................
    [Show full text]
  • There's Good Security and Then There's National
    BROCHURE THERE’S GOOD SECURITY AND THEN THERE’S NATIONAL SECURITY BlackBerry 10 and BES10 The perfect balance of protection and productivity Back to the Contents THE PERFECT BALANCE OF PROTECTION AND PRODUCTIVITY Contents BlackBerry 10 & BES10 3 Corporate Networks Under Attack 4 BlackBerry Security 5 Protecting Data in Motion 7 BES10 Security Philosophy 8 BES10 Certification & Encryption 9 BES10 Layers of Protection 9 Tech Talk 1 & 2 10 Protecting Work Data on Personal-Use-Enabled Devices 11 BlackBerry Balance 12 Tech Talk 3 13 Enforcing Strong Access Controls 14 BlackBerry 10 Device OS Security Features 15 BES10’s Gold level Controls and Settings 16 Manging Devices 18 BlackBerry Mobile Device Management in Action 19 End-to-end Security 21 3 BlackBerry 10 & BES10 End-to-end mobile data security without compromising business productivity or user satisfaction Keeping corporate data secure is a top priority for The entryways for potential attacks, data loss and productivity any organization. After all, a data breach can cause compromises include: significant financial losses, expose executives to legal Employees maintaining a mix of corporate and third-party actions, damage your company's reputation and weaken applications on the same device and exchanging information or eliminate competitive business advantage. between the two domains As more employees access your corporate network The installation of threat-vulnerable containerization through mobile devices to communicate, collaborate on mobile devices and share data, your infrastructure becomes increasingly Employees visiting sites where they encounter malware or vulnerable to outside attacks and harder to secure and malicious threats protect. The mixing of personal and work email accounts, apps and data, as well as the proliferation of employee- The use of employee-owned devices to access enterprise owned devices, increases the chance of major data leaks.
    [Show full text]
  • Blackberry Professional Software for Microsoft Exchange
    Upgrade Guide BlackBerry Professional Software for Microsoft Exchange Version: 4.1 | Service Pack: 4 SWD-356206-0423030341-001 Contents 1 Upgrading from the BlackBerry Professional Software to the BlackBerry Enterprise Server ........................... 5 Feature comparison for the BlackBerry Professional Software and the BlackBerry Enterprise Server ........................ 5 Host server and database upgrade scenarios......................................................................................................................... 6 2 System requirements.......................................................................................................................................................... 7 System requirements: BlackBerry Enterprise Server ............................................................................................................ 7 System requirements: BlackBerry Attachment Service ........................................................................................................ 9 System requirements: BlackBerry Manager ........................................................................................................................... 10 System requirements: BlackBerry MDS Connection Service ............................................................................................... 11 System requirements: BlackBerry MDS Integration Service ............................................................................................... 12 System requirements: BlackBerry Router ..............................................................................................................................
    [Show full text]
  • Installation Guide SWD-906306-1018091231-001 Contents 1 Planning a Blackberry Enterprise Server Installation
    BlackBerry Enterprise Server for IBM Lotus Domino Version: 4.1 | Service Pack: 7 Installation Guide SWD-906306-1018091231-001 Contents 1 Planning a BlackBerry Enterprise Server installation............................................................................................................ 4 Installing all BlackBerry Enterprise Server components on one computer.............................................................................. 4 Installing the BlackBerry Attachment Service............................................................................................................................. 4 Installing the BlackBerry Collaboration Service.......................................................................................................................... 4 Installing the BlackBerry Manager............................................................................................................................................... 5 Installing the BlackBerry MDS Connection Service.................................................................................................................... 5 Installing the BlackBerry MDS Integration Service.................................................................................................................... 5 Installing the BlackBerry Router................................................................................................................................................... 6 Configuring the Hosted BlackBerry services..............................................................................................................................
    [Show full text]
  • Security Guidelines for Storage Infrastructure
    NIST Special Publication 800-209 Security Guidelines for Storage Infrastructure Ramaswamy Chandramouli Doron Pinhas This publication is available free of charge from: https://doi.org/10.6028/NIST.SP.800-209 NIST Special Publication 800-209 Security Guidelines for Storage Infrastructure Ramaswamy Chandramouli Computer Security Division Information Technology Laboratory Doron Pinhas Continuity Software New York, NY This publication is available free of charge from: https://doi.org/10.6028/NIST.SP.800-209 October 2020 U.S. Department of Commerce Wilbur L. Ross, Jr., Secretary National Institute of Standards and Technology Walter Copan, NIST Director and Under Secretary of Commerce for Standards and Technology Authority This publication has been developed by NIST in accordance with its statutory responsibilities under the Federal Information Security Modernization Act (FISMA) of 2014, 44 U.S.C. § 3551 et seq., Public Law (P.L.) 113-283. NIST is responsible for developing information security standards and guidelines, including minimum requirements for federal information systems, but such standards and guidelines shall not apply to national security systems without the express approval of appropriate federal officials exercising policy authority over such systems. This guideline is consistent with the requirements of the Office of Management and Budget (OMB) Circular A-130. Nothing in this publication should be taken to contradict the standards and guidelines made mandatory and binding on federal agencies by the Secretary of Commerce under statutory authority. Nor should these guidelines be interpreted as altering or superseding the existing authorities of the Secretary of Commerce, Director of the OMB, or any other federal official. This publication may be used by nongovernmental organizations on a voluntary basis and is not subject to copyright in the United States.
    [Show full text]
  • N-Central Services Reference Manual
    SERVICES REFERENCE MANUAL SolarWinds N-central Version 12.0 SP1 Last Updated: Monday, October 15, 2018 Services Reference Manual: SolarWinds N-central page 2 Services Reference Manual: SolarWinds N-central About SolarWinds N-central services SolarWinds N-central services monitor customer devices, generate email alerts and PSA tickets, and enable technicians to view the status of devices and troubleshoot errors. Services are composed of metrics that monitor one aspect of a device. For example, the CPU service monitors the overall device CPU usage and the top five CPU-consuming processes. The Process service monitors not only if a specific process is running, but also the CPU, Memory and Disk I/O that the process is consuming. For a full list of services available, see the SolarWinds N-central Services List. SolarWinds N-central services use Reverse Polish Notation (RPN) for all calculation formulae. Service types SERVICE DESCRIPTION TYPE AMP Reports on results generated when running Automation Manager Policies using Global Output Parameters. Backup Monitors backup applications such as Backup Exec and Asigra for the device classes: n Laptop - Windows n Server - Generic/Windows n Workstation - Generic/Windows n Custom Backup Monitors integrated backup functionality based on D2D backup software. Manager EDF Customized services use a Java agent - External Data Feed - to monitor devices and applications through scripts. ESXi Monitors aspects of ESXi servers, including power consumption, logical drives, and related properties using the CIM services/ports. Local Services monitored by agents, including CPU, Disk, Memory and Process services. Log File Agents for Windows, OS X and Linux can scan log files.
    [Show full text]
  • Blackberry Enterprise Server for Microsoft Exchange-Security Note
    BlackBerry Enterprise Server for Microsoft Exchange Placing the BlackBerry Router in the DMZ Version: 5.0 Service Pack: 4 Security Note Published: 2014-01-16 SWD-20140116170308145 Contents 1 BlackBerry Router............................................................................................................................ 4 Opening a direct connection between a device and a BlackBerry Router...............................................................................5 Advantages of using the BlackBerry Router protocol...................................................................................................... 5 Data flow: Authenticating a device with the BlackBerry Enterprise Server using the BlackBerry Router protocol ............. 6 Closing a direct connection between a device and BlackBerry Router.............................................................................6 Installing BlackBerry Router instances to create a chain....................................................................................................... 6 BlackBerry Router connection types and port numbers ........................................................................................................7 2 Installing a BlackBerry Router.........................................................................................................10 Installing a standalone BlackBerry Router ..........................................................................................................................10 Installing the BlackBerry
    [Show full text]
  • Solarwinds N-Central
    SERVICES REFERENCE MANUAL SolarWinds N-central Version 11.2 Last Updated: Monday, April 16, 2018 Services Reference Manual: SolarWinds N-central page 2 Services Reference Manual: SolarWinds N-central About SolarWinds N-central services SolarWinds N-central services monitor customer devices, generate email alerts and PSA tickets, and enable technicians to view the status of devices and troubleshoot errors. Services are composed of metrics that monitor one aspect of a device. For example, the CPU service monitors the overall device CPU usage and the top five CPU-consuming processes. The Process service monitors not only if a specific process is running, but also the CPU, Memory and Disk I/O that the process is consuming. For a full list of services available, see the SolarWinds N-central Services List. SolarWinds N-central services use Reverse Polish Notation (RPN) for all calculation formulae. Service types SERVICE DESCRIPTION TYPE AMP Reports on results generated when running Automation Manager Policies using Global Output Parameters. Backup Monitors backup applications such as Backup Exec and Asigra for the device classes: n Laptop - Windows n Server - Generic/Windows n Workstation - Generic/Windows n Custom Backup Monitors integrated backup functionality based on D2D backup software. Manager EDF Customized services use a Java agent - External Data Feed - to monitor devices and applications through scripts. ESXi Monitors aspects of ESXi servers, including power consumption, logical drives, and related properties using the CIM services/ports. Local Services monitored by agents, including CPU, Disk, Memory and Process services. Log File Agents for Windows, OS X and Linux can scan log files.
    [Show full text]
  • BES10 Cloud Solution-Security Technical Overview
    Security Technical Overview BES10 Cloud Solution Market Preview Published: 2014-04-22 SWD-20140422090823041 Contents Introduction..................................................................................................................... 7 About this guide................................................................................................................................................................8 What is BES10 Cloud?.......................................................................................................................................................9 Key features of BES10 Cloud....................................................................................................................................10 Key security features of the BES10 Cloud solution.................................................................................................... 11 Hardware and OS security.............................................................................................. 13 Hardware root of trust for BlackBerry devices..................................................................................................................14 The BlackBerry 10 OS.....................................................................................................................................................15 The file system........................................................................................................................................................ 15 Sandboxing............................................................................................................................................................
    [Show full text]
  • Security Target
    BlackBerry Smartphones with OS 10.3.3 Security Target Doc No: 1958-001-D102 Version: 1.10 9 January 2017 BlackBerry 2200 University Ave. E Waterloo, Ontario, Canada N2K 0A7 Prepared by: EWA-Canada 1223 Michael Street, Suite 200 Ottawa, Ontario, Canada K1J7T2 BlackBerry Smartphones with OS 10.3.3 Security Target CONTENTS 1 SECURITY TARGET INTRODUCTION ............................................. 1 1.1 DOCUMENT ORGANIZATION............................................................. 1 1.2 SECURITY TARGET REFERENCE ........................................................ 1 1.3 TOE REFERENCE ............................................................................. 2 1.4 TOE OVERVIEW .............................................................................. 2 1.5 TOE DESCRIPTION .......................................................................... 3 1.5.1 Physical Scope ............................................................................... 3 1.5.2 TOE Guidance ................................................................................ 5 1.5.3 Logical Scope ................................................................................. 6 2 CONFORMANCE CLAIMS ............................................................... 8 2.1 COMMON CRITERIA CONFORMANCE CLAIM ........................................ 8 2.2 ASSURANCE PACKAGE CLAIM ........................................................... 8 2.3 PROTECTION PROFILE CONFORMANCE CLAIM .................................... 8 3 SECURITY PROBLEM DEFINITION .............................................
    [Show full text]
  • Blackberry Enterprise Server for Microsoft Exchange-Technical Note
    BlackBerry Enterprise Server for Microsoft Exchange Placing the BlackBerry Enterprise Server in a Segmented Network Version: 5.0 Service Pack: 4 Technical Note Published: 2014-01-16 SWD-20140116165150736 Contents 1 Using a segmented network to prevent the spread of malware........................................................... 4 2 Protecting BlackBerry Enterprise Solution communications in your organization's environment......... 5 How a BlackBerry Enterprise Server and messaging server protect a connection to each other ............................................. 5 How the BlackBerry Enterprise Server components and the BlackBerry MVS protect communication ...................................6 How the BlackBerry Collaboration Service connects to an instant messaging server and collaboration clients on devices ...... 7 3 Architecture: BlackBerry Enterprise Server components in a segmented network.............................. 8 4 BlackBerry Enterprise Solution connection types and port numbers................................................ 12 BlackBerry Administration Service connection types and port numbers.............................................................................. 12 BlackBerry Attachment Service connection types and port numbers...................................................................................14 BlackBerry Collaboration Service connection types and port numbers................................................................................ 15 BlackBerry Configuration Database connection types
    [Show full text]