WIRELESS NETWORKS AND MOBILE IP
WIRELESS NETWORKS
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
The WPS process contains a cryptographic vulnerability
|
|
WPS is only available for Windows devices
|
|
The WPS process is too complex for most people
|
|
It’s easy to brute force the WPS PIN
|
Detailed explanation-1: -Impact. An attacker within radio range can brute-force the WPS PIN for a vulnerable access point. The attacker can then obtain WEP or WPA passwords and likely gain access to the Wi-Fi network. Once on the network, the attacker can monitor traffic and mount further attacks.
Detailed explanation-2: -WPS is a convenient way to connect your devices to your router, but it can pose a security risk. It’s a good idea to turn off WPS functionality once all your devices are connected and allow guests to connect via a guest network so your private devices stay safe.
Detailed explanation-3: -Devices without WPS certification is not able to take advantage of the enhanced security provided by WPS. Non WPS devices will require the user to enter the long hexadecimal passphrase manually. WPS does not supports “Ad Hoc” connection that allows devices to communicate directly with each other. More items