Name and describe the two types of wireless intrusion systems.

What will be an ideal response?

The first is a wireless intrusion detection system (WIDS) while the second is a more sophisticated wireless intrusion prevention system (WIPS).  A WIDS constantly monitors the RF for attacks.  If an attack is detected, the WIDS sends information about what just occurred. A more proactive approach than intrusion detection is a WIPS. A WIPS monitors network traffic to immediately react to block a malicious attack.

Computer Science & Information Technology

You might also like to view...

The result of =ROUNDUP(123.456,0) is ________

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Which of the following expansion slots is characterized by having an x16 speed?

A. CNR B. PCI C. PCIe D. AGP

Computer Science & Information Technology