TELECOMMUNICATIONS SYSTEMS
COMMUNICATION WIRELESS COMPUTING DEVICES
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
PIN method
|
|
push-button method
|
|
piconet method
|
|
NFC method
|
Detailed explanation-1: -Overview. Wi-Fi Protected Setup (WPS) provides simplified mechanisms to configure secure wireless networks. The external registrar PIN exchange mechanism is susceptible to brute-force attacks that could allow an attacker to gain access to an encrypted Wi-Fi network.
Detailed explanation-2: -The PIN (Personal Identification Number) Method is one of the connection methods developed by the Wi-Fi Alliance. By inputting a PIN which is created by an Enrollee (your machine) to the Registrar (a device that manages the wireless LAN), you can setup the wireless network and security settings.
Detailed explanation-3: -WPS can be implemented in modes: push button configuration (PBC), Pin input configuration (PIN), and AP PIN. PBC: Press a WPS button to achieve a secure WPS connection. PIN: Enter an STA PIN on an ONT to achieve a secure WPS connection.
Detailed explanation-4: -Routers with WPS turned on have a PIN code that’s automatically generated. You can find the WPS PIN on the WPS configuration page. Some devices without a WPS button will ask for that PIN. They authenticate themselves and connect to the wireless network if you enter it.
Detailed explanation-5: -Which of these is a vulnerability of MAC address filtering in a WLAN? unencrypted.