Read the scenario below and then answer the following questions regarding wireless and mobile security. Nonhlanhla wants to have wireless access in the employee break room and conference room next to her office. However, her employer’s IT staff turns down her request for a wireless network. Nonhlanhla decides to take the matter into her own hands: she purchases an inexpensive consumer wireless router and secretly brings into her office and connects it to the wired network, thus providing wireless access to the employees in her area. Q.3.3.1 Name the type of Access Point (AP) that has been installed by Nonhlanhla. Provide a reason for your answer. (5) Q.3.3.2 List any two tools that you could use to detect what Nonhlanhla has secretly installed. (4)
Read the scenario below and then answer the following questions regarding
wireless and mobile security.
Nonhlanhla wants to have wireless access in the employee break room and
conference room next to her office. However, her employer’s IT staff turns
down her request for a wireless network. Nonhlanhla decides to take the
matter into her own hands: she purchases an inexpensive consumer
wireless router and secretly brings into her office and connects it to the
wired network, thus providing wireless access to the employees in her area.
Q.3.3.1 Name the type of Access Point (AP) that has been installed by
Nonhlanhla.
Provide a reason for your answer.
(5)
Q.3.3.2 List any two tools that you could use to detect what Nonhlanhla has
secretly installed.
(4)
Step by step
Solved in 3 steps