Chapter Review Questions

You can find the answers to the following questions in Appendix A, "Answers to Chapter Review Questions."

1:

What are the three major security threats of a wireless network?

2:

What is the primary means for guarding against traffic monitoring?

3:

How do you keep hackers from gaining access to company resources through the wireless network?

4:

What method will help alleviate the implications of a successful DoS attack?

5:

Why is WEP not acceptable for protecting sensitive information?

6:

How is TKIP different than WEP?

7:

WPA uses TKIP and is a subset of the 802.11i standard. True or false?

8:

Why is the use of MAC address filters not effective?

9:

What is a rogue access point, and why does it pose a problem?

10:

What should you install on a laptop that a user will utilize on a public wireless LAN to avoid unauthorized people from accessing files on the laptop?