Chapter 14 Wireless Network Security 151 Copyright Goodheart-Willcox Co., Inc. May not be reproduced or posted to a publicly accessible website. Name ________________________________________________________________ 9. Double-click a network to select it. In what channel is this network? With how many networks does your network overlap? _ __________________________________________________________________________________________________________________ __________________________________________________________________________________________________________________ __________________________________________________________________________________________________________________ _________________________________________________________________________________________________________________ 10. Look at the upper right-hand corner of the inSSIDer screen. Note the link score, and explain why you think this is either a good or bad score. _ __________________________________________________________________________________________________________________ __________________________________________________________________________________________________________________ __________________________________________________________________________________________________________________ _________________________________________________________________________________________________________________ 11. Look to the lower-left area of the screen. Are there any other nearby networks overlapping this channel? If so, list them. _ __________________________________________________________________________________________________________________ __________________________________________________________________________________________________________________ __________________________________________________________________________________________________________________ _________________________________________________________________________________________________________________ 12. Walk around to discover new wireless networks. As you do so, assess the SSIDs you find, and answer the following questions. A. Do some provide clues about the network’s location, use, or vendor? _ __________________________________________________________________________________________________________________ __________________________________________________________________________________________________________________ __________________________________________________________________________________________________________________ _________________________________________________________________________________________________________________ B. Which ones do you think should be changed and why? _ __________________________________________________________________________________________________________________ __________________________________________________________________________________________________________________ __________________________________________________________________________________________________________________ _________________________________________________________________________________________________________________ C. Which SSIDs do you think would be particularly attractive to hackers and why? _ __________________________________________________________________________________________________________________ __________________________________________________________________________________________________________________ __________________________________________________________________________________________________________________ _________________________________________________________________________________________________________________