Which of the following techniques are used to secure wireless networks?

Which of the following techniques are used to secure wireless networks? Each correct answer
represents a complete solution. Choose three.

Which of the following techniques are used to secure wireless networks? Each correct answer
represents a complete solution. Choose three.

A.
MAC address filtering

B.
IP spoofing

C.
Closed network

D.
SSID spoofing

Explanation:

Closed network, SSID spoofing, and MAC address filtering are techniques that can be used to secure
wireless networks.
In the closed network technique, the wireless access point (WAP) does not broadcast its Service Set
Identifier (SSID). Users are required to know the SSID to ensure whether or not the wireless network
exists.
In the SSID spoofing technique, a software generates numerous WAP packets that advertise bogus
SSIDs. When hackers scan for a wireless network, they receive the bogus SSIDs that cannot be
differentiated from a valid SSID.
Most WAPs support MAC address filtering that limits the clients, so that the WAP communicates
only with valid media access control (MAC) addresses.
Answer option B is incorrect. In IP spoofing, a user modifies packet headers using someone else’s IP
address to hide his identity. However, IP spoofing cannot be used while surfing the Internet, chatting
online etc. This is because forging the source IP address causes the responses to be misdirected.
Reference: TechNet, Contents: “Making IEEE 802.11 Networks Enterprise-Ready”



Leave a Reply 0

Your email address will not be published. Required fields are marked *