Chapter 8

1: What are the three major security threats of a wireless network?
A1: Answer: Traffic monitoring, unauthorized access, and DoS.
2: What is the primary means for guarding against traffic monitoring?
A2: Answer: Utilize encryption.
3: How do you keep hackers from gaining access to company resources through the wireless network?
A3: Answer: Incorporate the use of effective authentication.
4: What method will help alleviate the implications of a successful DoS attack?
A4: Answer: Have an alternative plan to carry on business in a manner that doesn't require the use of the wireless network.
5: Why is WEP not acceptable for protecting sensitive information?
A5: Answer: Hackers are able to crack the WEP encryption algorithm through the use of publicly available tools.
6: How is TKIP different than WEP?
A6: Answer: TKIP make use of a dynamic key distribution mechanism that updates keys periodically, whereas WEP makes use of static keys that don't change.
7: WPA uses TKIP and is a subset of the 802.11i standard. True or false?
A7: Answer: True.
8: Why is the use of MAC address filters not effective?
A8: Answer: It's difficult to manage and easy to spoof.
9: What is a rogue access point, and why does it pose a problem?
A9: Answer: A rogue access point does not have any security features set and is put in by a hacker or employee. The rogue access point offers an open port to the network for hackers to exploit.
10: What should you install on a laptop that a user will utilize on a public wireless LAN to avoid unauthorized people from accessing files on the laptop?
A10: Answer: Personal firewall.
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.145.8.42