Which of the following is this an example of?

A computer supply company is located in a building with three wireless networks. The system security team implemented a quarterly security scan and saw the
following.
SSID State Channel Level
Computer AreUs1 connected 1 70dbm
Computer AreUs2 connected 5 80dbm
Computer AreUs3 connected 3 75dbm
Computer AreUs4 connected 6 95dbm
Which of the following is this an example of?

A computer supply company is located in a building with three wireless networks. The system security team implemented a quarterly security scan and saw the
following.
SSID State Channel Level
Computer AreUs1 connected 1 70dbm
Computer AreUs2 connected 5 80dbm
Computer AreUs3 connected 3 75dbm
Computer AreUs4 connected 6 95dbm
Which of the following is this an example of?

A.
Rogue access point

B.
Near field communication

C.
Jamming

D.
Packet sniffing

Explanation:
The question states that the building has three wireless networks. However, the scan is showing four wireless networks with the SSIDs: Computer AreUs1 ,
Computer AreUs2 , Computer AreUs3 and Computer AreUs4. Therefore, one of these wireless networks probably shouldn’t be there. This is an example of a rogue

access point.
A rogue access point is a wireless access point that has either been installed on a secure company network without explicit authorization from a local network
administrator, or has been created to allow a hacker to conduct a man-in-the-middle attack. Rogue access points of the first kind can pose a security threat to large
organizations with many employees, because anyone with access to the premises can install (maliciously or non-maliciously) an inexpensive wireless router that
can potentially allow access to a secure network to unauthorized parties. Rogue access points of the second kind target networks that do not employ mutual
authentication (client-server server- client) and may be used in conjunction with a rogue RADIUS server, depending on security configuration of the target network.
To prevent the installation of rogue access points, organizations can install wireless intrusion prevention systems to monitor the radio spectrum for unauthorized
access points.
Incorrect Answers:
B: Near field communication (NFC) is a set of short-range wireless technologies, typically requiring a distance of 10 cm or less. NFC operates at 13.56 MHz on
ISO/IEC 18000-3 air interface and at rates ranging from 106 kbit/s to 424 kbit/s. NFC always involves an initiator and a target; the initiator actively generates an RF
field that can power a passive target. This enables NFC targets to take very simple form factors such as tags, stickers, key fobs, or cards that do not require
batteries. NFC peer-to-peer communication is possible, provided both devices are powered.
NFC tags contain data and are typically read-only, but may be rewriteable. They can be custom- encoded by their manufacturers or use the specifications provided
by the NFC Forum, an industry association charged with promoting the technology and setting key standards. The tags can securely store personal data such as
debit and credit card information, loyalty program data, PINs and networking contacts, among other information. The NFC Forum defines four types of tags that
provide different communication speeds and capabilities in terms of configurability, memory, security, data retention and write endurance. Tags currently offer
between 96 and 4,096 bytes of memory.
The SSID’s in the question indicate wireless networks. Therefore this answer is incorrect.
C: Jamming is used to block transmissions typically over wireless or radio frequencies. This is not what is described in this question. Therefore, this answer is
incorrect.
D: Packet sniffing is the process of intercepting data as it is transmitted over a network. A sniffer (packet sniffer) is a tool that intercepts data flowing in a network. If
computers are connected to a local area network that is not filtered or switched, the traffic can be broadcast to all computers contained in the same segment. This
doesn’t generally occur, since computers are generally told to ignore all the comings and goings of traffic from other computers. However, in the case of a sniffer,
all traffic is shared when the sniffer software commands the Network Interface Card (NIC) to stop ignoring the traffic. The NIC is put into promiscuous mode, and it
reads communications between computers within a particular segment. This allows the sniffer to seize everything that is flowing in the network, which can lead to
the unauthorized access of sensitive data. A packet sniffer can take the form of either a hardware or software solution. A sniffer is also known as a packet analyzer.
This is not what is described in this question. Therefore, this answer is incorrect.

http://en.wikipedia.org/wiki/Rogue_access_point
http://en.wikipedia.org/wiki/Near_field_communication
http://www.techopedia.com/definition/4113/sniffer



Leave a Reply 0

Your email address will not be published. Required fields are marked *

2 + twelve =