What is an easy way to make your WiFi security stronger and make it more difficult for hackers to discover your wireless network quizlet?
802.11 (Wi-Fi) applies to wireless LANs Show o 802.11a - 5 GHz, 54 Mbps by using Orthogonal Frequency Division Multiplexing (OFDM) o 802.11b - 2.4 GHz, 11 Mbps by using direct-sequence spread spectrum DSSS modulation. o 802.11d is an enhanced version of 802.11a and 802.11b. o 802.11e: It
is used for real-time applications such as voice, VoIP, and video. o 802.11g - 54 Mbps using the OFDM technology and uses the same 2.4 GHz band as 802.11b. o 802.11ac - 5 GHz. o 802.11i
o 802.11ad - 60 GHz o 802.15: It defines the standards for a wireless personal area network (WPAN). It describes the specification for wireless connectivity with fixed or portable devices o 802.15.1 - Bluetooth is mainly used for exchanging data over short distances on fixed and mobile devices. This standard works on a 2.4 GHz ban o 802.15.4 (ZigBee), 802.15.5 (mesh network), 802.16 (WiMax), 802.11X (RADIUS) 1.Change the default password on your router Recommended textbook solutions
What steps can you take to secure your wireless network quizlet?Several steps can be taken to secure a wireless network from hackers and piggybackers, including the following: Change the SSID. Disable SSID broadcast. Change the router's default password.
Why is it important to protect a Wi Fi network quizlet?Wireless networks are less secure than cable ones. If you do not secure your wireless network then anyone within range can access it. The importance of security: When you connect to your own wireless network you will probably see all of the others within range in a pop up like this one.
What special problem can occur with wireless networks?What special problems can occur with wireless networks? Distance from the router, as well as floors, walls, and large metal objects between a device and the router can interfere with wireless connectivity.
What type of malware allows an attacker to bypass authentication?Backdoors are a type of malware that allows an attacker to bypass authentication, to gain access to a compromised system.
|