PrepAway - Latest Free Exam Questions & Answers

Which of the following methods can be used to detect a rogue access point in order to enhance the security of

Which of the following methods can be used to detect a rogue access point in order to enhance the security of the network?
Each correct answer represents a complete solution. Choose all that apply.

PrepAway - Latest Free Exam Questions & Answers

A.
Check in the managed AP list

B.
Use of wireless sniffing tools

C.
Install WIPS

D.
Hide the SSID of all AP

Explanation:
Following are the methods of detecting a rogue access point in order to enhance the security of the network:
Installing a wireless intrusion prevention system (WIPS) will help in detecting the rogue access point. Wireless intrusion prevention system (WIPS) is a network device that monitors the radio spectrum for the presence of unauthorized access points (intrusion detection), and can automatically take countermeasures (intrusion prevention). The primary purpose of a WIPS is to prevent unauthorized network access to local area networks and other information assets by wireless devices.

A wireless sniffing tool such as NetStumbler captures information regarding access points that are within its range and helps in securing the network.
The rogue access point can be checked in the managed AP list by comparing the wireless MAC address (also called as BSSID) of the access point against the managed access point BSSID list. Answer option D is incorrect. Hiding the SSID of all AP will not help in detecting the rogue access point (AP).
What is NetStumbler?
NetStumbler is one of the most famous wireless auditing tools. It works with a wide variety of cards. If it is loaded on a computer, it can be used to detect 802.11 networks. It can easily identify the SSIDs and security tools. It can even identify the channel being used. This tool can also be integrated with the GPS to identify the exact location of AP for plotting onto a map.

One Comment on “Which of the following methods can be used to detect a rogue access point in order to enhance the security of


Leave a Reply