What are the three major security threats of a wireless network?
Answer: Traffic monitoring, unauthorized access, and DoS.
What is the primary means for guarding against traffic monitoring?
Answer: Utilize encryption.
How do you keep hackers from gaining access to company resources through the wireless network?
Answer: Incorporate the use of effective authentication.
What method will help alleviate the implications of a successful DoS attack?
Answer: Have an alternative plan to carry on business in a manner that doesn't require the use of the wireless network.
Why is WEP not acceptable for protecting sensitive information?
Answer: Hackers are able to crack the WEP encryption algorithm through the use of publicly available tools.
How is TKIP different than WEP?
Answer: TKIP make use of a dynamic key distribution mechanism that updates keys periodically, whereas WEP makes use of static keys that don't change.
WPA uses TKIP and is a subset of the 802.11i standard. True or false?
Why is the use of MAC address filters not effective?
Answer: It's difficult to manage and easy to spoof.
What is a rogue access point, and why does it pose a problem?
Answer: A rogue access point does not have any security features set and is put in by a hacker or employee. The rogue access point offers an open port to the network for hackers to exploit.
What should you install on a laptop that a user will utilize on a public wireless LAN to avoid unauthorized people from accessing files on the laptop?
Answer: Personal firewall.