Computer Science-Access Point Security

Access Point Security

Q1)

-In the Betty Davis case in the beginning of Chapter 7, the access point did not have security. This makes a MIM attack much easier. What is the Man-in-the-middle attack? 

-How is it possible to use a MIM attack if the legitimate access point does not implement 802.11i?

————————————–

Q2)

-The 802.11 standard has many sub standards including g/a/n/ac as discussed on pages 208-210 of the text. What are the major advantages and disadvantages of each?

-Also, research and see changes are predicted for 802.11 in the next five years.

Previous answers to this question


This is a preview of an assignment submitted on our website by a student. If you need help with this question or any assignment help, click on the order button below and get started. We guarantee authentic, quality, 100% plagiarism free work or your money back.

order uk best essays Get The Answer