1. Describe wireless networking standards
2. Describe the process of authentication
3. Describe wireless hacking and tools used by hackersand security professionals
4. Explain that configuring an AP varies depending onthe embedded OS.
5. Explain how data sent by one station moves betweenthese three components to reach a second station.
6. Explain the security improvements of 802.11i over802.11b.
Book to use: Michael T. Simpson, NicholasAntill, Hands-On Ethical Hacking and Network Defense, ThirdEdition. (Chapter 11)
PLEASE ANSWER ALL QUESTIONS!!! or leave for someone whowould
​​​​​​​