PrepAway - Latest Free Exam Questions & Answers

Which of the following best describes the downfall of these approaches?

Some wireless environments authenticate wireless devices before they are allowed access to the wired environment, via SSID and/or MAC values. Which of the following best describes the downfall of these approaches?

PrepAway - Latest Free Exam Questions & Answers

A.
Both are easily captured through brute force attacks.

B.
The SSID is broadcasted by the wireless device and the MAC address is broadcasted by the access point.

C.
The MAC is not broadcasted by the wireless device and the SSID address is broadcasted by the access point.

D.
Both are sent in cleartext.

Explanation:
The SSID is usually required when a wireless devices wants to
authenticate to an AP. For the device to prove that it should be allowed to
communicate with the wired network, it must first provide a valid SSID value. The
SSID should not be seen as a reliable security mechanism because many APs broadcast
their SSIDs, which can be easily sniffed and used by attackers. If the AP is
configured to require a MAC value for authentication, this data is also sent in
cleartext from the wireless device.

One Comment on “Which of the following best describes the downfall of these approaches?


Leave a Reply