TELECOMMUNICATIONS SYSTEMS
COMMUNICATION WIRELESS COMPUTING DEVICES
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
WPA2
|
|
WAF
|
|
WEP
|
|
None of the above
|
Detailed explanation-1: -Wireless network security issues and threats spoofing and session hijacking-where the attacker gains access to network data and resources by assuming the identity of a valid user. eavesdropping-where unauthorised third parties intercept the data being transmitted over the secure network.
Detailed explanation-2: -Wireless networks are particularly vulnerable to attacks because it is difficult to prevent physical access to them. The only advantage they have in this respect is that an attacker must be in physical proximity to the network, which can limit the pool of potential attackers.
Detailed explanation-3: -RFID technology is the wireless use of electromagnetic fields to transfer data for the purposes of automatically identifying and tracking tags attached to objects.
Detailed explanation-4: -Which of the cryptographic algorithms listed below is the least vulnerable to attacks? The Advanced Encryption Standard (AES) is a symmetric-key block cipher algorithm and U.S. government standard for secure and classified data encryption and decryption.