Copyright Goodheart-Willcox Co., Inc. 469 9. Which represents an attack of unwanted messages and texts via an open Bluetooth connection? A. Bluejacking B. Bluetexting C. Bluemessaging D. Bluesnarfing 10. When using the IEEE 802.1X standard authentication, which of the following is the computer referred to when trying to connect to the wireless network? A. Authenticator B. WNIC C. AP D. Supplicant LAB EXERCISES Lab Activity 14-1: Viewing Wireless Information with Netsh Netsh is a command-line Windows program that allows you to view and configure networking protocols. In this lab, we will use it to view wireless information. You need access to a windows device with a wireless adapter to view this information. 1. Open the Windows Command Prompt with administrator access. 2. Enter the syntax netsh, which places you in the interactive mode of this command. Type ? and press the [Enter] key to see all available commands. 3. Run the wlan command to access the wireless local area network configuration page. Type ? and press the [Enter] key to see all available commands in this context. 4. Type show interfaces and enter. This displays the wireless interfaces on your system and their MAC address and status. Provide a screenshot of your results. 5. Use the syntax show networks to display a list of all wireless networks in your area. How many wireless networks were discovered? What authentication options did you see? 6. Use the showwlanreport command to obtain complete information. This command will create an HTML file. Note the location of this file. 7. Type and enter quit to exit. 8. Navigate to the file indicated in the netsh showwlanreport and open it with your default browser. How could this tool be useful to a security administrator? Lab Activity 14-2: Exploring a Wireless Router’s Configuration Each wireless router vendor has its own interface and options. Essentially, all devices need similar configuration information. In this lab, you will use free simulators from tp-link to explore the configuration interface. 1. Launch a web browser, and navigate to a search engine. 2. Conduct a search using the phrase, tp-link emulators. At the time of this writing, the correct website was located at https://tp-link.com/us/support/emulator. 3. Choose the Archer c3200 device. If you find multiple options, be sure to select the English version.
Previous Page Next Page