COMPUTER FUNDAMENTALS

COMPUTER ETHICS AND SECURITY

SECURITY MEASURES AND TECHNIQUES

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Methods for securing a wireless network.
A
MAC Address filtering
B
Wi-Fi Protected Access (WPA)
C
Security tokens
D
Packet filtering
Explanation: 

Detailed explanation-1: -WPA works using discrete modes for enterprise and personal use. The most recent enterprise mode, WPA-EAP, uses a stringent 802.1X authentication. The latest personal mode, WPA-PSK, uses Simultaneous Authentication of Equals (SAE) to create a secure handshake.

Detailed explanation-2: -Enterprise-Enterprise is more secure than WPA Personal. In this type, every client automatically receives a unique encryption key after securely logging on to the network. This key is automatically updated at regular intervals. WPA uses TKIP and WPA2 uses the AES algorithm.

Detailed explanation-3: -WPA uses TKIP, which changes temporal keys after every 10, 000 packets and distributes the keys, thus improving security. Additionally, WPA uses a four-way handshake encryption protocol that ensures that the wireless client and access point can identify each other without sending a key.

Detailed explanation-4: -Change default passwords. Restrict access. Encrypt the data on your network. Protect your Service Set Identifier (SSID). Install a firewall. Maintain antivirus software. Use file sharing with caution. Keep your access point software patched and up to date. More items •01-Feb-2021

Detailed explanation-5: -Using your computer or mobile device, open a web browser. On the address bar, type the Router IP address you took note on the previous step then press ENTER. Go to Wireless > Security menu option. Change the encryption option to WPA2-PSK. Create a strong password: More items •10-Jan-2023

There is 1 question to complete.