TELECOMMUNICATIONS SYSTEMS
COMMUNICATION WIRELESS COMPUTING DEVICES
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
web-based
|
|
captive portal
|
|
rougue
|
|
internet content filter
|
Detailed explanation-1: -1. Change the default name of your home Wi-Fi. First, change the SSID (service set identifier), or name, of your home Wi-Fi network. Many manufactures give all their wireless routers a default SSID.
Detailed explanation-2: -Which of the following attacks is considered easy, allowing threat actors to access user data and read through passwords and PINs, and why is it considered so? A WLAN consumer attack, because many users fail to properly configure security on their home WLANs.
Detailed explanation-3: -A wireless router is a two-in-one appliance. It combines the functionality of a wireless AP–connecting a group of wireless stations to an adjacent wired network–with the capabilities of an Ethernet router, which forwards IP packets between the wireless subnet and any other subnet.
Detailed explanation-4: -Which of these is a vulnerability of MAC address filtering in a WLAN? unencrypted.