Preview

Telecommunications HW

Good Essays
Open Document
Open Document
486 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Telecommunications HW
2a) War drivers are people who drive around a city looking for working access points that are unprotected. Drive-by hackers park just outside a company's premises and intercept the firm's data transmissions.
b) A rogue access point is an access point that could be set up by a company's department or an individual employee. This access point usually have no security which makes it easy for hackers to get into the system.

5a) 802.11i
b) WPA2
c) AES-CCMP
d) Because it is expensive and there is no cracks with the WPA
e) WPA is no longer viewed as a safe solution because in 2009 a partial crack appeared. This means the standard was not as safe as it was before.

7a) PSK mode uses a shared key initial authentication by everyone who are allowed to use access points without the need of a central authentication server. In 802.1X, every workgroup switch acts as an authenticator. Authentication is done by central authentication server.
b) A pass phrase is used to create a shared key between access point and hosts. If pass phrase is short then it is easy to crack.
c) The pass phrase should be at least 20 characters long.

10a) This is because traveling to each access point for manual configuration would be very costly. So a centralized access point makes it so the management can fix issues from one area, saving them money.
b) Smart Access Points that can add an intelligence to every access point that allows the central management to communicate directly with the access point. Also, wireless LAN switches. This is because the management intelligence can be placed on the WLAN switch rather than in the access point themselves. Then multiple access points can connect to the WLAN switch.
c) The systems should notify the WLAN admins of failures immediately as they happen. They should provide continuous transmission-quality monitoring at all access points. They should help provide security by detecting rogue access points, evil twin access points, and other

You May Also Find These Documents Helpful

  • Good Essays

    Refer to the exhibit. When configuring the wireless access point, which setting does the network administrator use to configure the unique identifier that client devices use to distinguish this wireless network from others?…

    • 2145 Words
    • 9 Pages
    Good Essays
  • Satisfactory Essays

    Hit-150-Wk4D1

    • 539 Words
    • 3 Pages

    (1) security features or software that protect information when a wireless network is used. (2) non-redisclosure policies. (3) storage and retention policies.…

    • 539 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    For this week’s lab we are using various scenarios to compare and contrast different antenna types and solutions to reduce signal spillover in a specific wireless network. Also we are evaluating and comparing the different possible security methods that could be implemented in a wireless network and listed the advantages and disadvantages of each network. And also looking into possible methods for locating a rogue access point, with the goal of getting a better understanding of not only troubleshooting issues but learning some methods for securing the network also.…

    • 1620 Words
    • 7 Pages
    Better Essays
  • Satisfactory Essays

    Lab 8 Questions

    • 306 Words
    • 1 Page

    2. To prevent outsiders from exploiting connected resources and sniffing data that is being transmitted. The best encryption method is WPA2.…

    • 306 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    SEC 435 Wk 11 Final Exam

    • 513 Words
    • 3 Pages

    ____ is a free stumbler application for Mac OS X that puts the computer’s wireless card into monitor mode.…

    • 513 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    This article gives contrasts between the 802.11ac standard and the 802.11ad standard. While both are still in development, they will both be an upgrade to the existing 802.11n standard. Currently, 802.11ac will utilize the 5GHz frequency, whereas, 802.11ad will use 60GHz. The idea is that the localized but high-bandwidth 60GHz network can be used for specific, highly demanding tasks, keeping the standard 5GHz frequency free for normal use for laptops, tablets, smartphones and other peripheral devices. Network World is a leader in the networking industry when it…

    • 1693 Words
    • 7 Pages
    Good Essays
  • Good Essays

    When connecting to a private and secured wireless access point, you must provide the information that proves you have the right to use the network. true…

    • 602 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Unit 6 assignment

    • 378 Words
    • 2 Pages

    Basic Service Set – In Wireless LAN’s a single wireless access point and the client devices that send data to/from that access point…

    • 378 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Appendix G

    • 175 Words
    • 1 Page

    Cloak the ssid so that no one will pick up your network while they are scanning. Basically implements a closed network…

    • 175 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    unit 8 assignement

    • 920 Words
    • 3 Pages

    Wireless technology has become an increasingly crucial part of today's world. From health care and retail to academia across the world, wireless systems are improving the rate and ease with which data is sent and received. Two specific examples of the wireless technology used today personally and professionally are local area networks (LAN) and personal area networks (PAN).…

    • 920 Words
    • 3 Pages
    Good Essays
  • Good Essays

    ISM 4220

    • 2410 Words
    • 10 Pages

    MULTIPLE CHOICE. Choose the one alternative that best completes the statement or answers the question.…

    • 2410 Words
    • 10 Pages
    Good Essays
  • Satisfactory Essays

    IEEE 802.15 deals with the subject of Wireless personal area networks (WPANs) which includes standards for Bluetooth, co-existence of WPANs with other wireless devices, high-rate and low-rate WPANs, and mesh networking.…

    • 577 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    There are employee and guest wireless (wifi) networks that are available for leadership and clients that need to access the Internet on their wireless devices and laptops. There is also an additional wifi network that is set-up for other employees to use on personal laptops, ipads, tablets, etc.…

    • 791 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    unit 7 assignment 1

    • 547 Words
    • 2 Pages

    WLANs (wireless local area networks) are becoming increasingly prevalent, not only in schools, but in many businesses and establishments. They can provide a plethora of benefits within a school environment including flexibility, speed, and resource mobility. A WLAN would assist in ease of use, and make many of the day-to-day functions of school employees easier.…

    • 547 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    So its just design is to break the N level PDU into sections and reassemble them in the request they were available before. The division happens at (N- 1) layer. It breaks the N level PDU into different (N-1) level PDUs. Additionally they do not need to hold a duplicate of header as it disregards the guideline of layer separation itself.…

    • 1413 Words
    • 6 Pages
    Good Essays