1.
What key benefits does Wandera provide to customers?
Correct Answer
C. Visibility, Savings and Security
Explanation
Savings, Visibility and Security are the three key pillars of the Wandera service and we always explain these benefits in detail when we speak to prospects.
1. Visibility: Wandera View provides previously unavailable insight into mobile data usage on a per app and per user basis. We effectively itemise a phone bill for data;
2. Savings: Wandera Extend delivers data savings through the use of proprietary compression and policy regulation;
3. Security: Wandera Secure detects one-off network threats and persistent threats from apps on mobile devices to ensure data and network integrity
2.
What does APN stand for?
Correct Answer
D. Access Point Name
Explanation
APN or Access Point Name is the name of the gateway of the mobile carrier which provides access to the Internet. Having a Wandera APN profile on your device means your carrier passes your cellular web data to Wandera for optimisation and visibility
3.
What does the Wandera App do?
Correct Answer
C. It provides end-user usage information and sends location data and heartbeat information to the Wandera service
Explanation
The Wandera App detects the location of the user using the SLC (Significant Location Change) functionality of the operating system so that a roaming policy can be applied at the Gateway level when a user is a out of the country.
The App also delivers useful end-user reports, and collects heartbeat information for threat detections and security improvement.
4.
What happens when a user is "blocked" by a Wandera policy?
Correct Answer
C. The user can't access the specific site or app
Explanation
The user can't access that specific site or app that is blocked. Block policies are configured in RADAR to match a block rule by URL. For example, news.bbc.co.uk will match only that subdomain, whereas apple.com will match the entire domain. Once set, both browser and app web traffic will be blocked by Wandera.
5.
How is Wandera installed on iOS mobile devices?
Correct Answer
A. An App and an APN profile are installed
Explanation
Both an app and an APN profile are installed.
The APN profile ensures that mobile data is redirected via the Wandera optimisation service and the Wandera App detects the location of the user so that a roaming policy can be applied. The App also delivers useful end-user reports.
6.
What does a Wandera APN setting do?
Correct Answer
A. It configures a web proxy setting on the device to ensure all cellular web data is redirected via Wandera's Mobile Data Gateway
Explanation
The Wandera APN profile configures a proxy setting to ensure all cellular web data is redirected from the carrier gateway onwards to Wandera's MDG. The Wandera APN should not be confused with a private APN which would replace the existing mobile carrier as the default gateway to the Internet.
In fact, customers need to specify which mobile carrier each user is on so that we can provide the correct Wandera APN settings.
The settings apply to cellular data only.
7.
What happens when a roaming user reaches their "data cap"?
Correct Answer
A. All cellular web data is blocked (except for the admin-configured whitelist exceptions)
Explanation
All cellular web data/traffic that passes through Wandera will be blocked - this doesn't include WiFi traffic or non cellular web traffic such as tethering.
8.
What is a valid method that a customer can use to deploy Wandera
Correct Answer
D. The admin deploys Wandera using App Push and a supported MDM
Explanation
An administrator can set-up App Push by following the instructions within RADAR.
9.
For what time period(s) can the "data cap" be configured?
Correct Answer
B. Daily and monthly
Explanation
Daily and Monthly.
The data cap functionality can be configured for a monthly or daily period. If the data cap is configured for a monthly period then the customer is required to specifiy the start of the billing cycle
10.
What's the name of Wandera's admin management portal?
Correct Answer
C. RADAR
Explanation
RADAR is the central admin portal where Wandera administrators can add / manage users, configure compression and policy settings and view data usage reports.
11.
What is the web address for RADAR?
Correct Answer
C. Radar.wandera.com
Explanation
radar.wandera.com can be used to access RADAR
12.
What cost plans can be configured in RADAR?
Correct Answer
B. Cost per MB while roaming and monthly cost for a domestic plan. Cost plans can be set and created for each carrier.
Explanation
The settings tab allows the user to input two cost numbers: a cost per roaming MB and monthly plan costs.
Most users use a blended average to specify the cost per roaming MB and simply enter their monthly plan costs for domestic cost settings.
13.
What can an admin determine from the Apps/Sites report provided in View?
Correct Answer
C. Data usage and popularity of apps
Explanation
View, provides a report which itemises how much data each app consumed over the period and is expressed as a share of overall data (ie. how data hungry the app is).
The report also highlights what share of the user base has used the site/app (ie. how popular an app is). This report can also be filtered on a per user basis.
14.
How does Wandera calculate savings?
Correct Answer
A. Data saved by compression and estimated savings through usage policy
Explanation
Wandera Data Savings are calculated based on the compression savings and the most popular blocks. The savings associated with blocks are calculated using a proprietary algorithm that looks at the average data usage for that destination. For example, when Facebook is blocked, Wandera calculates in real-time the average data usage of a Facebook session (based on data from our entire user base).
15.
What compression settings can be configured in RADAR?
Correct Answer
C. Images and Video
Explanation
Wandera customers can tune the compression settings for Images and Video. They can be set as Low, Med and High in a domestic and a roaming scenario. On average, Low compression results in 5%-10% data savings, Medium compression in 10%-20% data savings and High in 20%-30%. These are averages and actual results depend on your traffic profile. Generally speaking, the higher the share of regular web traffic, the higher the savings.
16.
What is plus WiFi?
Correct Answer
A. Security & Compliance over WiFi Connections
Explanation
Wandera can no handle WiFi traffic on iOS supervised devices, via our GHP deployment.
17.
What happens to most corporate email traffic?
Correct Answer
B. Email traffic passes through the Wandera Secure Mobile Gateway but isn't compressed
Explanation
Email traffic passes throught Wandera but is not compressed.
Most companies use ActiveSync or another secure web connection to sync email to the device. Email traffic (and SSL / HTTPS traffic in general) passes through the Wandera service but isn’t compressed.
This means secure connections are fully functional for the end user and may be subject to blocking, capping and reporting by the RADAR admin.
Their secure nature means that compression is not applied.
18.
What happens to VPN traffic on a Wandera enrolled device?
Correct Answer
A. VPN traffic isn't redirected via Wandera because it used a different port (other than ports 80/443)
Explanation
VPN traffic isn't redirected via Wandera.
The Wandera APN settings redirect all cellular Web traffic via the Wandera services.
VPN traffic isn’t regarded as web traffic and therefore it will bypass the service.
19.
What happens to tethered / personal hotspot traffic?
Correct Answer
C. Tethered traffic is classified as non-web data and bypasses the Wandera proxy
Explanation
The Wandera APN settings redirect all cellular Web traffic via the Wandera optimisation service. This does not include tethered traffic. Wandera has recently released the cellular counters feature which allows administrators to measure non HTTP traffic, including tethered data.
20.
How frequently does the Wandera engineering team aim to roll out new features to the service?
Correct Answer
B. Once every 2 - 3 weeks
Explanation
Wandera uses an AGILE development methodology and releases improvements and new features every 2-weeks.
21.
When a customer admin makes a policy change in RADAR, how quickly is the update pushed out to the proxies?
Correct Answer
A. Almost immediately
Explanation
Policy changes are made availible in real-time
22.
The Wandera Architecture has been built to be what?
Correct Answer
A. Cloud Agnostic
Explanation
Wandera's global platform was built to be cloud agnostic. It has been architected from the ground up to run in different public clouds. We also call this a heterogenous data center architecture
23.
Which of the following are Wandera components?
Correct Answer
A. View, Extend and Secure
Explanation
Wandera offers 3 products - View, Extend and Secure based on our proven cloud Mobile Data Gateway (MDG)
24.
What protocols are routed through the Wandera service using APN?
Correct Answer
A. HTTP and HTTPS traffic only
Explanation
HTTP and HTTPS traffic only is routed to the Wandera Mobile Data Gateway (MDG) through the use of a proxy server.
A VPN option, which will route all traffic through the MDG, will be available in the near future.
25.
Which of the following are reports available under Wandera View? (Select all that apply)
Correct Answer(s)
A. Usage
B. Roaming
E. Sites / Apps
G. Business / Personal
H. User Summary
I. Tethering
J. Categories
Explanation
Usage, Roaming, Sites/Apps, Business/Personal, User Summary
26.
What is Wandera Secure?
Correct Answer
B. A multi-level security solution designed to detect and stop mobile threats on employee devices
Explanation
Wandera Secure is a multi-level solution that provides organizations with real-time visibility and detection of mobile threats affecting your employees’ mobile devices. Equipped with risk assessment and scoring for each threat and device, you are able to evaluate your organization’s exposure to mobile security threats and take prioritized action against those that are impacting your users.
27.
Wandera Secure provides multi-level protection because?
Correct Answer
D. It correlates data from the device, in-line proxy and EMM software
Explanation
Wandera Secure collects security-related information for each Wandera-enrolled device from multiple sources and levels, including at the gateway-level with Wandera Mobile Data Gateway and at the device-level through the Wandera app.
Wandera is the only multi level security solution for mobile. This data is processed and correlated by our cloud-based proprietary security assessment engine – SmartWire Threat Intelligence – with threats discovered presented within RADAR – the Wandera Admin portal.
28.
Wandera detects and classifies threats into Network Threats and Persistent Threats. What are Network Threats?
Correct Answer
D. Threats resulting from a connection to the Internet
Explanation
A network threat represents communication between a device and the Internet that poses a risk to the user, his privacy or data.
App-to-Server communication and web browser activity is typically the sources of network threats.
These events are transient in nature and may occur multiple times or only once. Wandera can block network threats in real-time at the gateway level with Wandera Mobile Data Gateway. Examples include phishing, spam, or user id leaks, password leaks, etc.
29.
What specific threats does Wandera Secure detect (select all that apply)?
Correct Answer(s)
A. Malicious profiles
B. pHishing
C. Spam
D. Leaky/Insecure Apps
E. Browser Malware
F. Outdated OS
G. Jailbreak status
H. Malicious Apps
Explanation
Malicious profiles: Configuration profiles are created with Apple’s iPhone Configuration Utility. They’re intended for IT departments and cellular carriers. These files have the .mobileconfig file extension and are essentially an easy way of distributing network settings to iOS devices. For example, a configuration profile can contain Wi-Fi, VPN, email, calendar, and even passcode restriction settings. An IT department can distribute the configuration profile to its employees, allowing them to quickly configure their device to connect to the corporate network and other services.
The bad guys can create their own configuration profile files and distribute them. The profile could configure the device to use a malicious proxy or VPN, effectively allowing the attacker to monitor everything going over the network and redirect the device to phishing websites or malicious pages.
Configuration profiles could also be used to install certificates. If a malicious certificate was installed, the attacker could effectively impersonate secure websites like banks.
Configuration profiles can be distributed in several different ways. The most concerning ways are as email attachments and as files on web pages. An attacker could create a spear phishing email encouraging employees of a corporation to install a malicious configuration profile attached to the email. Or, an attacker could set up a phishing site that tries to download a configuration profile file.
Compared to rogue apps, the configuration profile can only infect the device in a limited way. It can’t replicate itself like malware, nor can it hide itself from view like a rootkit. It can only point the device at malicious servers and install malicious certificates.
Phishing: is the practice of targeting specific users’ information within a corporation and represents a significant threat to enterprises. Spam filters have been an effective defense against emails used by hackers, yet more than 300,000 new phising sites a month were discovered in 2012. For the typical email attack, the hacker obtains an employee’s email address and sends a message with a malicious link or file attachment. The employee may read the message while in a meeting and unwittingly hit the link in the email that takes them to a phishing site that installs malware. The employee may know better, but they’re multi-tasking, looking at a small screen and probably not using their best judgment. Still the bad guys get the information they seek. SMS phishing is the practice of texting people phishing emails that try to get users to log in to their banking or gain access to the corporate network.
Insecure Apps: Poorly secured mobile apps and browsers have proved to be a "golden nugget," according to a May 2010 NSA presentation: harvesting sensitive data sent over public networks by applications is not a problem, but it was a little trickier to tag the intercepted information in the agency's XKeyscore database so that analysts could easily pull up a person's records. As an example the immensely popular Angry Birds game from Finnish developer Rovio had become a useful source thanks to advertising code added by US firm Millennial Media.
Millennial's tracking software generates a personal record for each user that can store information from their political affiliation and sexual orientation to whether their marital state was single, married, divorced, engaged or "swinger." This information is used to target in-app ads more effectively, and can be collected by UK and US intelligence agencies for analysis. This may sound like an extreme example but many approved can leak sensitive corporate information from those devices. For example, an employee may install an app that asks for access to their address book, which may contain the names and information of every employee in your enterprise since employee address books are connected to Microsoft’s Active Directory. The app will then send the entire contents of the address book to a server on the Internet, which could be stolen by hackers. That means there might very well be a database in the loud that contains all the names, titles, phone numbers, and email addresses of each of your employees. With access to this information, hackers have everything they need for spear phishing and advanced persistent threats.
Leaky Apps: these are apps that transmit sensitive information such as usernames, passwords, email addresses or location in the clear without encrypting the data. Any man in the middle can intercept these credentials and use it to steal information and money
Browser Malware: Mobile web browser is an emerging attack vector for mobile devices. Just as common Web browsers, mobile web browsers are extended from pure web navigation with widgets and plug-ins, or are completely native mobile browsers. Jailbreaking the iPhone is often based entirely on vulnerabilities on the web browser. As a result, the exploitation of the vulnerability described here underlines the importance of the Web browser as an attack vector for mobile devices. In this case, there was a vulnerability based on a stack-based buffer overflow in a library used by the web browser. Smartphones are also victims of classic piracy related to the web: phishing, malicious websites, etc. The big difference is that smartphones do not have any layered defence against such threats.
Outdated OS: Security patches or fixes for mobile devices' operating systems are not always installed on mobile devices in a timely manner. It can take weeks to months before security updates are provided to' devices depending on whether users take action. For example, the iOS 7.1.2 update fixes a critical email encryption bug, which leaves unpatched users vulnerable to hackers stealing email attachments. Also, outdated OS users are more vulnerable to jailbreaks as most OS updates patch know jailbreak exploits
Jailbreak: OS jailbreaking is the process of removing limitations on iOS, Apple's operating system on devices running it through the use of software and hardware exploits. Jailbreaking permits root access to the iOS file system and manager, allowing the download of additional applications, extensions, and themes that are unavailable through the official Apple App Store. This leaves the device highly vulnerable to malicious apps and other threats
Malicious Apps: The top categories types of mobile malicious app include:
Premium Service Abuser – Send text messages to premium mobile phone numbers, racking up unauthorized charges.
- Adware – Leak data such as GPS location, personal information and call logs enabling advertising to better target ads and reach more users. Some adware also send unwarranted notifications that can annoy users and cause battery drain.
- Information Theft – Similar to adware and some legitimate apps, this type of malware leaks sensitive information. The intent here is almost always to find sensitive information that can be sold or exploited for other attacks such as phishing or mobile banking fraud.
- Malicious Downloader – Main purpose is to download other malware.
30.
Automated Threat Responses allow you to (select all that apply) -
Correct Answer(s)
A. Set-up Admin Notifications in the event of Security Events
B. Set-up User Notifications in the event of Security Events
C. Block certain traffic automatically (where possible) in the event of a specific Security Event being detected
E. Configure EMM Tagging for further remediation actions
Explanation
Automated threat responses all you to set-up notifications and block certain traffic automatically for certain categories
31.
How can administrators use Wandera Secure to measure the severity of threats that impact a device or organization? (Select all that apply)
Correct Answer
B. A risk score between 0 and 100 indicating the level of risk in RADAR
Explanation
RADAR provides visibility to organizations and assists them by identifying and prioritizing detected security events. Wandera Secure applies a severity value to each threat while providing a calculated score of risk for each device and the company as a whole.
Severity of a threat is graded on a score of one to five, with five being the most severe. Our security experts are constantly assessing the risk of threats we detect, applying the appropriate severity level to each. Risk is determined based upon a variety of factors, such as the likelihood of a vulnerability being exploited and the impact severity if it were exploited.
Our risk scoring utilizes a proprietary algorithm based upon the severity and quantity of threats detected on a device, resulting in an assigned value to each device between 0 and 100. The higher the risk score, the more at risk that device is and the sooner it should be evaluated. A company wide risk score is derived from all of the organization’s combined risk scores to allow you to assess the overall security posture of the customer's mobile deployment in a single glance.
32.
What is MI:RIAM?
Correct Answer
A. Wandera's proprietary cloud-based threat detection engine
Explanation
Wandera’s proprietary SmartWire algorithm analyzes and correlates data across all known threats and detects anomalies in the cloud and on the device, across the Wandera customer network. By using a combination of multiple, correlated detection techniques and the industry’s largest mobile data set, SmartWire is able to accurately determine the security risk of each mobile data request. For example, if SmartWire identifies passwords sent as clear text from a device, all devices with the culprit app are flagged and/or secured thereafter. If a mobile device is on an unknown Wi-Fi network, the service closely monitors all data transfers especially with other employees’ devices. SmartWire also leverages multiple malware scanners, app and other security databases
33.
What are device 'heartbeats'?
Correct Answer
C. Device fingerprints (configuration, apps, events and logs) collected from the device by the Wandera app
Explanation
Wandera app collects heuristic data such as configuration files, events and other logs from the device seamlessly and continuously upload them to the Wandera Mobile Data Gateway for processing.
Data from different devices are correlated with various threats found. With the proprietary SmartWire machine learning technology, cues from risky devices are fed into the system to detect threats that are present on other devices in real-time. MDG will alert administrator to seek remediation promptly and limit the spread.
34.
What does every deployment start with?
Correct Answer
B. A Customer Activation Call
Explanation
A customer activation call is the initial step in every deployment process. This call allows the deployment team to communicate with the customer and gather important information about their requirements, preferences, and expectations. It helps in setting the right direction for the deployment and ensures that all parties are on the same page. This call also provides an opportunity to address any concerns or questions the customer may have and establish a strong working relationship between the customer and the deployment team.
35.
There are 6 key areas within RADAR to cover during the Activation Call.Which of the following is not one of those key areas?
Correct Answer
C. Review each Threat Category
Explanation
Enrolling Devices and customising APN Settings are not key steps on an Activation Call.
Key steps are: Configue Data Policy, Configure Carrier Plans, View Reports, Extend Reports and Secure Reports
36.
How long is data retained on Wandera?
Correct Answer
B. 12 months
Explanation
Standard Retention Policy is 12 months. Data is securely dropped from our datawarehouses after the 12 month period.
37.
Which of the following are the established ways to contact Wandera support should any issues arise? (Select all that apply)
Correct Answer(s)
A. pHone call
B. Email
C. Raising a Support Ticket within the Support Centre
ExplanationThe following support contact means are available:
Email –
[email protected]
Ticket through web portal – https://support.wandera.com (requires log into Radar)
Phone – +44 203 301 2660
38.
What Secure reports and views are available in RADAR?
Correct Answer
A. Threat and device based threat report along with raw security events
Explanation
The correct answer is "Threat and device based threat report along with raw security events." This means that in RADAR, users have access to reports that provide information on both threats and device-based threats. Additionally, they can also view raw security events.
39.
Which component does Wandera use to synchronise between RADAR and a supported MDM solution?
Correct Answer
C. EMM Connect
Explanation
Wandera uses the EMM Connect component to synchronize between RADAR and a supported MDM solution. This component allows for seamless integration and communication between the two systems, ensuring that data and policies are synchronized accurately and efficiently.
40.
How is Wandera installed on Samsung Galaxy mobile devices?
Correct Answer
C. An App is installed and a Device Administrator is configured
Explanation
Both an app and a device administrator are configured on Android devices.
41.
What information is displayed to an Administrator when they log in to their RADAR Portal?
Correct Answer
A. Product Updates Splash Screen
Explanation
Product Updates are displayed to administrators upon logging into the RADAR Portal
42.
Which of the following are Wandera Data Centre locations?
Correct Answer(s)
A. Sao Paolo, Brazil
B. Hong Kong, China
C. Milan, Italy
F. Paris, France
Explanation
Wandera uses Data Centres located in Sao Paolo, Hong Kong and Syndey Australia
43.
What happens when Wandera are unable to determine a device location for 72 hours?
Correct Answer
B. The device is put into an Auto-Roaming status and the roaming policy is automatically applied
Explanation
The device is put into an Auto-roaming status and the devices auto roaming policy is automatically applied
44.
Can Wandera be installed on an iPad?
Correct Answer
B. Yes, iPads which have a valid SIM card are supported
Explanation
Wandera can be installed on iPad devices which have a valid SIM card in place
45.
What can be configured within Service Controls?
Correct Answer
C. Advanced configuration items such as PIN Lock Profiles
Explanation
Service Controls are used to configure more advanced items such as App Ping functionality
46.
What installation steps are required when installing Wandera on an iOS device?
Correct Answer(s)
A. Access to Location Services
B. Enable Push Notifications
D. Install Secure Mobile Gateway Profile
Explanation
Location Services, Push Notifications and the Secure Mobile Gateway would be required to complete an installation
47.
What information is contained on the Support Centre?
Correct Answer(s)
B. Contact details for the Support team
C. Useful guides and tips to assist you in deploying and managing Wandera
Explanation
Contact details for the support team and useful guides and tips are included on the Support Centre
48.
What is the correct email address to contact Wandera Support?
49.
What does a Critical Device Status mean?
Correct Answer
D. Wandera have not seen device traffic in over 72 hours
Explanation
A critical device status denotes that Wandera have not seen cellular traffic from the device in over 72 hours
50.
What can a Super Administrator do that a regular Administrator can not?
Correct Answer(s)
B. Create new administrators
C. Delete administrators
Explanation
Super Administrators have the ability to create and delete administrator accounts