You can find the answers to the following questions in Appendix A, "Answers to Chapter Review Questions."
1: | What are the three major security threats of a wireless network? |
2: | What is the primary means for guarding against traffic monitoring? |
3: | How do you keep hackers from gaining access to company resources through the wireless network? |
4: | What method will help alleviate the implications of a successful DoS attack? |
5: | Why is WEP not acceptable for protecting sensitive information? |
6: | How is TKIP different than WEP? |
7: | WPA uses TKIP and is a subset of the 802.11i standard. True or false? |
8: | Why is the use of MAC address filters not effective? |
9: | What is a rogue access point, and why does it pose a problem? |
10: | What should you install on a laptop that a user will utilize on a public wireless LAN to avoid unauthorized people from accessing files on the laptop? |