Name and describe the two types of wireless intrusion systems.
What will be an ideal response?
The first is a wireless intrusion detection system (WIDS) while the second is a more sophisticated wireless intrusion prevention system (WIPS). A WIDS constantly monitors the RF for attacks. If an attack is detected, the WIDS sends information about what just occurred. A more proactive approach than intrusion detection is a WIPS. A WIPS monitors network traffic to immediately react to block a malicious attack.
Computer Science & Information Technology