D. Passive scanning Case Studies for Chapter 8 chapter offer generic scenarios f
ID: 3853087 • Letter: D
Question
D. Passive scanning Case Studies for Chapter 8 chapter offer generic scenarios for you to read through and answer accord the DVD The case studies in this chapter offer generic scenarios for you to rea ing to your own technology and experiences. T Your solutions might vary, but both can certainly be valid. Many case study solutions also point to hands-on videos and simulations, which can be found on the DVD here are example solutions in a PDF on Case Study 8-1: Securing a Wireless Device Scenario: You have a new client, a small marketing office with six computers and a SOHO router/ WAP. The dlient wants vou to seceure the device so that the internal computers will be safe ando that the wireless network will be difficult to attack. Define eight ways that you can protect this wireless network.Explanation / Answer
Step 1:WPA2
I think it's common networking knowledge that there relly is no excuse to not use any encryption method other than WPA2.
Step 2:Change Default passwords
Changing the default admin password is usually found in the system or administration areas of the interface.Changing the SSID's passpharase wireless settings.
Step 3: Activate Encryption
it is most important thing we must do to lock down your wireless network.
Step 4: Double Up on Firewalls
the router has a firewall built in that should protect your internal network against outside attacks.
Step 5:Turn off guest
use the VPN connection makes a tunnel between your device and the internet through third party server it can help mask your identity.
Step 6: update Router Firmware
People find security holes in routers all the time to exploit.so it is necessory to update the router firmware to so no one can find holes in network.
Step 7:Disable DHCP
if you have limited range of ip so the DHCP wouldn't allow more than a certain number of devices so no new user can access the network.
Step 8:Filter on MAC Addresses
you can use access control to allow or block computer oor electronic devices from accessing your network.
Please Rate THANK YOU.
Related Questions
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.