Discuss cracking wireless encryption.
What will be an ideal response?
Using encryption can stop casual leeching. Three types of wireless encryption are used: WEP, WPA, and WPA2. WEP and WPA cracking are very simple. Essentially, an attacker runs a sniffer program to capture packets, and then runs a program to sniff out the password or preshared key. Since WPA2 is very difficult and time-consuming to crack, it should be used before the other encryption methods.
You might also like to view...
Answer the following questions true (T) or false (F)
1. A local class and a nested class are the same thing. 2. Overloading a binary operator as a stand-alone function requires two arguments.
The _________ constant can be used to display an error message in a message dialog.
a) JOptionPane.ERROR_MESSAGE b) JOptionPane.ERROR_ICON c) JOptionPane.ERROR d) JOptionPane.ERROR_IMAGE
Running a macro in Excel deletes the entire Undo history
Indicate whether the statement is true or false
A sequential search of an n-element list takes ____ key comparisons on average to determine whether the search item is in the list.
A. 0 B. n/2 C. n D. n2