MAC the butter knife
What is a disadvantage of using MAC filtering as a security feature on your wireless access point?
What is a disadvantage of using MAC filtering as a security feature on your wireless access point?
Many access points provide options for controlling access to the wireless network. In this video, you’ll learn about MAC filtering and SSID management, and how it can be used to restrict access to a wireless network.
CompTIA Security+ SY0-301: 1.6 – MAC Filtering and SSID Management Read More »
When installing a wireless network, you want to be sure you can cover enough of the workspace without extending outside of the area. In this video, you’ll learn how wireless power configuration and antenna placement can be used to optimize your wireless network configuration.
CompTIA Security+ SY0-301: 1.6 – Wireless Power and Antenna Placement Read More »
Because wireless networks can be accessed without any type of restriction, the authentication method is very important. In this video, you’ll learn about the EAP, LEAP, and PEAP wireless authentication protocols.
CompTIA Security+ SY0-301: 1.6 – EAP, PEAP, and LEAP Read More »
Encryption is an important part of wireless communication. In this video, you’ll learn about WEP and WPA encryption and when they are used in 802.11 wireless networking.
Which of these wireless standards does not operate in the 2.4 GHz range?
Which of these wireless network standards support maximum throughputs of over 50 Mbps? Pick three.
Wireless networks are very susceptible to wireless monitoring. In this video, you’ll learn how to capture packets on your wireless network and ways that you can protect yourself from wireless packet analysis on open WiFi networks.
CompTIA Security+ SY0-301: 3.4 – Wireless Packet Analysis Read More »
Initialization vectors are important to build strong encryption, but historical 802.11 WEP vulnerabilities were partly related to poor IV implementations.
CompTIA Security+ SY0-301: 3.4 – Initialization Vector Attacks Read More »