What is the problem with rogue access points?

What will be an ideal response?


The problem of rogue (unauthorized) access points is of increasing concern within organizations. Because of the low cost of home wireless gateways, an unsuspecting employee can bring to her office a device and plug it into an open network connection to provide wireless access for herself and other employees. However, these rogue access points are serious threats to the security of the network because they allow attackers to intercept the RF signal and bypass network security to attack the network or capture sensitive data. There are several methods to detect a rogue access point.Two of the most common include mobile sniffing audits and wireless probes.

Computer Science & Information Technology

You might also like to view...

Depending on its current use, the Restore button can also be the Close button

Indicate whether the statement is true or false

Computer Science & Information Technology

What are the four main components that enable remote desktop server connectivity, and what is their function?

What will be an ideal response?

Computer Science & Information Technology

How do you determine if a worksheet is grouped?

A. The tabs of all grouped worksheets are yellow. B. A padlock icon appears on the title bar. C. An icon of stacked paper displays on each tab. D. [Group] displays in the title bar

Computer Science & Information Technology

What is the range of decimal values in each of the four groups of an IPv4 address?

A. 1 to 256 B. 0 to 255 C. 1 to 1024 D. 0 to 1023

Computer Science & Information Technology