Copyright Goodheart-Willcox Co., Inc. May not be reproduced or posted to a publicly accessible website. 150 Security Essentials Lab Manual 4. On the filter bar, review the filter options. Change the filter options under the 802.11 tab. Are there any networks running 802.11a or 802.11b? If so, list them by name. _ __________________________________________________________________________________________________________________ __________________________________________________________________________________________________________________ __________________________________________________________________________________________________________________ _________________________________________________________________________________________________________________ 5. Change the filter to view only Channel 1. How many networks are on this channel? Repeat for Channels 6 and 11. Record your findings for each channel. _ __________________________________________________________________________________________________________________ __________________________________________________________________________________________________________________ __________________________________________________________________________________________________________________ __________________________________________________________________________________________________________________ __________________________________________________________________________________________________________________ _________________________________________________________________________________________________________________ 6. Change the security filter by clicking the arrow and selecting the checkboxes next to WEP and WPA Personal. Which (if any) of the networks are running WEP or WPA personal? _ __________________________________________________________________________________________________________________ __________________________________________________________________________________________________________________ __________________________________________________________________________________________________________________ _________________________________________________________________________________________________________________ 7. List the names of any open (unsecured) networks you find. _ __________________________________________________________________________________________________________________ __________________________________________________________________________________________________________________ __________________________________________________________________________________________________________________ _________________________________________________________________________________________________________________ 8. Right-click on one of the networks, and add the Vendor column. Ensure all other filters are removed. This can be accomplished by clicking the X on each filter option under the filter bar. List the names of the unique vendors. _ __________________________________________________________________________________________________________________ __________________________________________________________________________________________________________________ __________________________________________________________________________________________________________________ __________________________________________________________________________________________________________________ __________________________________________________________________________________________________________________ _________________________________________________________________________________________________________________
Previous Page Next Page