0% found this document useful (0 votes)
19 views1 page

Wireless: NO Check Items Description Remarks

The document provides a checklist for examining a wireless network. It lists 5 items to check: 1) Perform an IP/network scan to detect hostnames, IPs, IP ranges, and MAC addresses. 2) Identify the number and types of network adapters and devices involved. 3) Analyze wireless transmission details like activity type, sources/destinations of traffic, and broadcast patterns. 4) Assess the network design by creating a diagram and mapping. 5) Evaluate the health and utilization of the network by reviewing hardware conditions, user notes, logs, and potential threats.

Uploaded by

Ryu Watanabe
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
19 views1 page

Wireless: NO Check Items Description Remarks

The document provides a checklist for examining a wireless network. It lists 5 items to check: 1) Perform an IP/network scan to detect hostnames, IPs, IP ranges, and MAC addresses. 2) Identify the number and types of network adapters and devices involved. 3) Analyze wireless transmission details like activity type, sources/destinations of traffic, and broadcast patterns. 4) Assess the network design by creating a diagram and mapping. 5) Evaluate the health and utilization of the network by reviewing hardware conditions, user notes, logs, and potential threats.

Uploaded by

Ryu Watanabe
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 1

s

NO

CHECK ITEMS

DESCRIPTION

Wireless
1.

IP / Network Scan

2.

Adapters / Devices

3.

4.
5.

Transmission

Design
Healthy/Utilization

Exist Hostname / Device


APs IP
Range of IP
MAC address involve
Quantity Adapter / Device that
Involved
Network Adapter Company
Devices
First Detection
Type of Activity
Source /Destination of packet or
data involved
Broadcast pattern
Ping / Tunneling
Speed Test

Network Mapping / Diagram


Condition of the Hardware
User Text Note
Time
Logs
Scan Threat

REMARKS

You might also like