FUNDAMENTALS OF COMPUTER

TELECOMMUNICATIONS SYSTEMS

COMMUNICATION WIRELESS COMPUTING DEVICES

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Why is a rogue AP a security vulnerability?
A
It uses the weaker IEEE 802.15.ax protocol.
B
It allows an attacker to bypass many of the network security configurations.
C
It requires the use of vulnerable wireless probes on all mobile devices.
D
It conflicts with other network firewalls and can cause them to become disabled.
Explanation: 

Detailed explanation-1: -A rogue access point provides a wireless backdoor channel into the private network for outsiders. It can bypass network firewalls and other security devices and opens a network to attacks.

Detailed explanation-2: -A rogue access point is an access point installed on a network without the network owner’s permission. Why is this bad? If an attacker owns the access point, they can intercept the data (e.g. PII) flowing through the network.

Detailed explanation-3: -A rogue wireless device is one of the leading security threats in wireless networking. It has the ability to disclose confidential system information that is potentially damaging to an organization. Access point (AP)-based rogue devices are wireless access points (WAP) installed in a network without authorization.

Detailed explanation-4: -When you enable rogue access point detection on your wireless Firebox, the wireless radio in the device scans wireless channels to identify unknown wireless access points. You can configure the scan to run continuously, or to run at a scheduled interval and time of day.

There is 1 question to complete.