Q: What are the three major security threats of a wireless network?

Answer: Traffic monitoring, unauthorized access, and DoS.

Q: What is the primary means for guarding against traffic monitoring?

Answer: Utilize encryption

Q: How do you keep hackers from gaining access to company resources through the wireless network?

Answer: Incorporate the use of effective authentication.

Q: What method will help alleviate the implications of a successful DoS attack?

Answer: Have an alternative plan to carry on business in a manner that doesn't require the use of the wireless network.

Q: Why is WEP not acceptable for protecting sensitive information?

Answer: Hackers are able to crack the WEP encryption algorithm through the use of publicly available tools.

Q: How is TKIP different than WEP?

Answer: TKIP make use of a dynamic key distribution mechanism that updates keys periodically, whereas WEP makes use of static keys that don't change.

Q: WPA uses TKIP and is a subset of the 802.11i standard. True or false?

Answer: True.

Q: Why is the use of MAC address filters not effective?

Answer: It's difficult to manage and easy to spoof.

Q: What is a rogue access point, and why does it pose a problem?

Answer: A rogue access point does not have any security features set and is put in by a hacker or employee. The rogue access point offers an open port to the network for hackers to exploit.

Q: What should you install on a laptop that a user will utilize on a public wireless LAN to avoid unauthorized people from accessing files on the laptop?

Answer: Personal firewall.


Get in touch

Feel free to contact us at yeahhub@gmail.com