Lab #8 - Assessment Worksheet

.docx

School

American Public University *

*We aren’t endorsed by this school

Course

262

Subject

Information Systems

Date

Jan 9, 2024

Type

docx

Pages

3

Uploaded by cheyennemaxey97

Report
Answers: 1. uses of the following Airmon-ng: puts network interface into monitoring mode Airodump-ng: captures data from a wireless network Aircrack-ng: cracks the ley of a selected network Aireplay-ng: injects packets into the desired network for later use to help decrypt the information 2. WPA2 is the best encryption method. It is critical to use encryption techniques to stop unauthorized user from accessing your network and obtaining personal information. 3. the following can be enabled as part of a layered security solution Limiting the number of addresses created by the WAP Static IP Addressing of devices MAC address filtering 4. To avoid identity theft Protect business/personal data To optimize network efficiency 5. denial of service attacks Spoofing and session hijacking piggybacking 6. malware can spread from other infected devices The network can be a trap set up by hackers to steal your passwords and other confidential information. 7. to identify issues to be resolved Improve performance 8. data is lost at the loss of the device
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help