FUNDAMENTALS OF COMPUTER

TELECOMMUNICATIONS SYSTEMS

COMMUNICATION WIRELESS COMPUTING DEVICES

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Which of these Wi-Fi Protected Setup (WPS) methods is vulnerable?
A
PIN method
B
push-button method
C
piconet method
D
NFC method
Explanation: 

Detailed explanation-1: -Overview. Wi-Fi Protected Setup (WPS) provides simplified mechanisms to configure secure wireless networks. The external registrar PIN exchange mechanism is susceptible to brute-force attacks that could allow an attacker to gain access to an encrypted Wi-Fi network.

Detailed explanation-2: -The PIN (Personal Identification Number) Method is one of the connection methods developed by the Wi-Fi Alliance. By inputting a PIN which is created by an Enrollee (your machine) to the Registrar (a device that manages the wireless LAN), you can setup the wireless network and security settings.

Detailed explanation-3: -WPS can be implemented in modes: push button configuration (PBC), Pin input configuration (PIN), and AP PIN. PBC: Press a WPS button to achieve a secure WPS connection. PIN: Enter an STA PIN on an ONT to achieve a secure WPS connection.

Detailed explanation-4: -Routers with WPS turned on have a PIN code that’s automatically generated. You can find the WPS PIN on the WPS configuration page. Some devices without a WPS button will ask for that PIN. They authenticate themselves and connect to the wireless network if you enter it.

Detailed explanation-5: -Which of these is a vulnerability of MAC address filtering in a WLAN? unencrypted.

There is 1 question to complete.