What are the steps to perform a mobile sniffing audit?
What will be an ideal response?
The steps for performing a mobile sniffing audit include:
1. Create a list of approved APs, including the Media Access Control (MAC) addresses, the vendor name, channel number, SSID, and security configurations.
2. Walk through the building or area and capture wireless traffic with the sniffer. When scanning several buildings or a large geographical area this can be extremely time consuming.
3. When an access point is detected by the sniffer, compare it against the list of approved devices. If an access point is discovered by the sniffer but is not listed as being approved it should be considered suspect.
4. Identify the exact location of the rogue AP. Walk in the direction of the signal that causes the RSSI signal strength of the AP to increase. This can be difficult in a building with many offices. It may be necessary to be accompanied by personnel who have keys and the authority to enter locked offices.
You might also like to view...
The method _____________ is called by the FXMLLoader before the GUI is displayed.
Fill in the blank(s) with the appropriate word(s).
If a user selects the ________ Related Fields option while creating a relationship, Access will automatically modify all foreign key values in a related table to match any modifications made to the primary key
Fill in the blank(s) with correct word
Which type of report consolidates data usually with totals, tables, or graphs, so that managers can review it quickly and easily?
A. storage B. summary C. detailed D. exception
The dtm prefix is used to denote a(n) ____ data type.
A. Boolean B. Char C. Single D. Date