What are some of the reasons why turning off SSID beaconing provides a limited degree of security?

What will be an ideal response?


Turning off SSID beaconing provides a limited degree of security. The reasons are as follows:
* Not all access points allow beaconing to be turned off, and even those that do typically discourage users from doing so.
* The steps to manually enter the SSID on a wireless device that does not receive a beaconed SSID are not always convenient.
* Turning off SSID beaconing prevents wireless devices from freely roaming from one wireless network to another.
* When a wireless device is using Microsoft Windows XP, a signal from both a wireless network that is broadcasting an SSID and one that is not broadcasting the SSID, the device will always connect to the access point that is broadcasting its SSID.
* Although the SSID can be suppressed from beacon frames, it still is transmitted in other management frames sent by the AP, and attackers who use wireless tools freely available on the Internet can easily see the SSID being transmitted.
* The SSID is initially transmitted in cleartext form when the device is negotiating with the access point.
* Many users do not change the default SSID and these are well known. An attacker can simply try default SSIDs until a connection is accepted.

Computer Science & Information Technology

You might also like to view...

________ data is data that does not change

A) Stable B) Fixed C) Aggregate D) Static

Computer Science & Information Technology

The filtering feature in Excel is great to perform ad hoc and spur-of-the-moment exploration of data

Indicate whether the statement is true or false

Computer Science & Information Technology

Which feature in Windows Server 2016 allows up to eight identical physical adapters on the host system to be configured as a team and mapped to a virtual switch?

A. Data center bridging B. Switch Embedded Teaming C. NIC Teaming D. Quality of Service

Computer Science & Information Technology

What happens at the transport layer of the OSI model?

What will be an ideal response?

Computer Science & Information Technology