1: | What are the three major security threats of a wireless network? |
A1: | Answer: Traffic monitoring, unauthorized access, and DoS. |
2: | What is the primary means for guarding against traffic monitoring? |
A2: | Answer: Utilize encryption. |
3: | How do you keep hackers from gaining access to company resources through the wireless network? |
A3: | Answer: Incorporate the use of effective authentication. |
4: | What method will help alleviate the implications of a successful DoS attack? |
A4: | Answer: Have an alternative plan to carry on business in a manner that doesn't require the use of the wireless network. |
5: | Why is WEP not acceptable for protecting sensitive information? |
A5: | Answer: Hackers are able to crack the WEP encryption algorithm through the use of publicly available tools. |
6: | How is TKIP different than WEP? |
A6: | Answer: TKIP make use of a dynamic key distribution mechanism that updates keys periodically, whereas WEP makes use of static keys that don't change. |
7: | WPA uses TKIP and is a subset of the 802.11i standard. True or false? |
A7: | Answer: True. |
8: | Why is the use of MAC address filters not effective? |
A8: | Answer: It's difficult to manage and easy to spoof. |
9: | What is a rogue access point, and why does it pose a problem? |
A9: | Answer: A rogue access point does not have any security features set and is put in by a hacker or employee. The rogue access point offers an open port to the network for hackers to exploit. |
10: | What should you install on a laptop that a user will utilize on a public wireless LAN to avoid unauthorized people from accessing files on the laptop? |
A10: | Answer: Personal firewall. |