Given John Smith uses a coffee shop's Internet hot - spot (no authentication or encryption) to transfer
funds between his checking and savings accounts at his bank's website. The bank’s website uses the
HTTPS protocol to protect sensitive account information. While John was using the hot - spot, a hacker
was able to obtain John’s bank account user ID and password and exploit this information.
What likely scenario could have allowed the hacker to obtain John’s bank account user ID and
password?
Question No 2
What type of WLAN attack is prevented with the use of a per - MPDU TKIP sequence counter (TSC)?
Question No 3
What 802.11 WLAN security problem is directly addressed by mutual authentication?
Question No 4
ABC Company uses the wireless network for highly sensitive network traffic. For that reason, they
intend to protect their network in all possible ways. They are continually researching new network
threats and new preventative measures. They are interested in the security benefits of 802.11w, but
would like to know its limitations.
What types of wireless attacks are protected by 802.11w? (Choose 2)
Question No 5
You are configuring seven APs to prevent common security attacks. The APs are to be installed in a
small business and to reduce costs, the company decided to install all consumer - grade wireless
routers. The wireless routers will connect to a switch, which connects directly to the Internet
connection providing 50 Mbps of Internet bandwidth that will be shared among 53 wireless clients
and 17 wired clients.
To ensure the wireless network is as secure as possible from common attacks, what security measure
can you implement given only the hardware referenced?