Access Point Security
Q1)
-In the Betty Davis case in the beginning of Chapter 7, the access point did not have security. This makes a MIM attack much easier. What is the Man-in-the-middle attack?
-How is it possible to use a MIM attack if the legitimate access point does not implement 802.11i?
————————————–
Q2)
-The 802.11 standard has many sub standards including g/a/n/ac as discussed on pages 208-210 of the text. What are the major advantages and disadvantages of each?
-Also, research and see changes are predicted for 802.11 in the next five years.
Previous answers to this question
This is a preview of an assignment submitted on our website by a student. If you need help with this question or any assignment help, click on the order button below and get started. We guarantee authentic, quality, 100% plagiarism free work or your money back.