Name and describe the two types of wireless intrusion systems.

What will be an ideal response?


The first is a wireless intrusion detection system (WIDS) while the second is a more sophisticated wireless intrusion prevention system (WIPS).  A WIDS constantly monitors the RF for attacks.  If an attack is detected, the WIDS sends information about what just occurred. A more proactive approach than intrusion detection is a WIPS. A WIPS monitors network traffic to immediately react to block a malicious attack.

Computer Science & Information Technology

You might also like to view...

Which of the following statements is false?

a. In Java SE 8, an interface may declare default methods—that is, public methods with concrete implementations that specify how an operation should be performed. b. When a class implements an interface, the class receives the interface’s default concrete implementations if it does not override them. c. When you enhance an existing interface with default methods—any class that implemented the original interface will break. d. With default methods, you can declare common method implementations in interfaces (rather than abstract classes), which gives you more flexibility in designing your classes.

Computer Science & Information Technology

You can customize the order in which an effect is played in the ________

A) Exit Effects B) Effect Options C) Animation Pane D) Animation Gallery

Computer Science & Information Technology

What are the problems of using community strings in SNMP?

What will be an ideal response?

Computer Science & Information Technology

A(n) ____________________ connection is usually a dedicated fiber line from the ISP to an office.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology