CEH

(Jeff_L) #1

368 Chapter 15 ■ Wireless Networking


software can easily use a wireless network to break into and take over a network or at the
very least steal information with ease.
You learned some of the defensive measures that are also available for wireless
technologies. 802.11 networks typically offer security in the form of WEP, WPA, or WPA2
as a front-line defense, with preference given to WPA2 and WPA over the much weaker and
broken WEP. If configured correctly, WPA and WPA2 offer strong integrity and protection
for information transmitted over the air. Additional security measures include the use of
strong passwords and phrases as well as the proper configuration of wireless gear.

Exam Essentials


Understand the various types of wireless technologies. Know that not all wireless
technologies are the same. Each wireless technology has different frequencies it works on,
channels it can use, and speeds it is capable of achieving to transmit data.

Know the differences between the 802.11 standards. Understand that each standard of
wireless has its own attributes that make it different from the others.

Understand WEP, WPA, and WPA2. Understand that WEP was the initial specification
included in the 802.11 protocol and that WPA and WPA2 were introduced later. Both of
the latter protocols are intended to be compatible with the 802.11i standard.
Free download pdf