Chapter 8

1:

What are the three major security threats of a wireless network?

A1:

Answer: Traffic monitoring, unauthorized access, and DoS.

2:

What is the primary means for guarding against traffic monitoring?

A2:

Answer: Utilize encryption.

3:

How do you keep hackers from gaining access to company resources through the wireless network?

A3:

Answer: Incorporate the use of effective authentication.

4:

What method will help alleviate the implications of a successful DoS attack?

A4:

Answer: Have an alternative plan to carry on business in a manner that doesn't require the use of the wireless network.

5:

Why is WEP not acceptable for protecting sensitive information?

A5:

Answer: Hackers are able to crack the WEP encryption algorithm through the use of publicly available tools.

6:

How is TKIP different than WEP?

A6:

Answer: TKIP make use of a dynamic key distribution mechanism that updates keys periodically, whereas WEP makes use of static keys that don't change.

7:

WPA uses TKIP and is a subset of the 802.11i standard. True or false?

A7:

Answer: True.

8:

Why is the use of MAC address filters not effective?

A8:

Answer: It's difficult to manage and easy to spoof.

9:

What is a rogue access point, and why does it pose a problem?

A9:

Answer: A rogue access point does not have any security features set and is put in by a hacker or employee. The rogue access point offers an open port to the network for hackers to exploit.

10:

What should you install on a laptop that a user will utilize on a public wireless LAN to avoid unauthorized people from accessing files on the laptop?

A10:

Answer: Personal firewall.