Chapter 8
1: | What are the three major security threats of a wireless network? |
A1: | Answer: Traffic monitoring, unauthorized access, and DoS. |
2: | What is the primary means for guarding against traffic monitoring? |
A2: | Answer: Utilize encryption. |
3: | How do you keep hackers from gaining access to company resources through the wireless network? |
A3: | Answer: Incorporate the use of effective authentication. |
4: | What method will help alleviate the implications of a successful DoS attack? |
A4: | Answer: Have an alternative plan to carry on business in a manner that doesn't require the use of the wireless network. |
5: | Why is WEP not acceptable for protecting sensitive information? |
A5: | Answer: Hackers are able to crack the WEP encryption algorithm through the use of publicly ... |
Get Wireless Networks first-step now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.