What are the steps to perform a mobile sniffing audit?

What will be an ideal response?


The steps for performing a mobile sniffing audit include:
1. Create a list of approved APs, including the Media Access Control (MAC) addresses, the vendor name, channel number, SSID, and security configurations.
2. Walk through the building or area and capture wireless traffic with the sniffer. When scanning several buildings or a large geographical area this can be extremely time consuming.
3. When an access point is detected by the sniffer, compare it against the list of approved devices. If an access point is discovered by the sniffer but is not listed as being approved it should be considered suspect.
4. Identify the exact location of the rogue AP. Walk in the direction of the signal that causes the RSSI signal strength of the AP to increase. This can be difficult in a building with many offices. It may be necessary to be accompanied by personnel who have keys and the authority to enter locked offices.

Computer Science & Information Technology

You might also like to view...

A high voltage (potential difference) stored in an insulated body that is released from one charged body to another with an unequal charge.

A. Lightning B.. Volts C. Spark D. ESD

Computer Science & Information Technology

?Case 22-2 Clark, an HR manager, wants to communicate a policy on information security to all the employees. He acquires the names and addresses of the employees from an Excel worksheet. He also drafts a preliminary text about the policy and a table of points to follow to ensure online safety. To complete the mail merge, Clark should:

A. ?pick a template for labels by clicking Themes in the Design tab. B. ?take an image of a label and use the Pictures command on the Insert tab. C. ?write the policy in a Word file and select it as the starting document. D. ?convert the worksheet into an Access table to import it into Word.

Computer Science & Information Technology

The DHCP specification, RFC 2131, defines the default value for T1 as:0.95 * duration_of_lease

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Macros may only be run from within a form or report.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology