a. What prompted the Wi-Fi Alliance to create WPA? b. Compare WPA and 802.11i security. c. What does the Wi-Fi Alliance call 802.11i? d. Despite its security weaknesses, why do many companies continue to use WPA instead of 802.11i?
a. What is the purpose of a wireless IDS? b. How do wireless IDSs get their data? c. What is a rogue access point? d. What are the two alternatives to using a centralized wireless IDS? e. Why are they not attractive?
Already registered? Login
Not Account? Sign up
Enter your email address to reset your password
Back to Login? Click here