You can find the answers to the following questions in Appendix A, "Answers to Chapter Review Questions."
What are the three major security threats of a wireless network?
What is the primary means for guarding against traffic monitoring?
How do you keep hackers from gaining access to company resources through the wireless network?
What method will help alleviate the implications of a successful DoS attack?
Why is WEP not acceptable for protecting sensitive information?
How is TKIP different than WEP?
WPA uses TKIP and is a subset of the 802.11i standard. True or false?
Why is the use of MAC address filters not effective?
What is a rogue access point, and why does it pose a problem?
What should you install on a laptop that a user will utilize on a public wireless LAN to avoid unauthorized people from accessing files on the laptop?