Wednesday, April 15, 2026

Comptia A+ Exam - Hardening WiFi communications, a security perspective.

For the CompTIA A+ exam (specifically Core 1 Domain 2.0 and Core 2 Domain 2.0), Wi-Fi hardening is categorized under SOHO (Small Office/Home Office) Security.

To "harden" a connection means to move beyond default settings to a layered defense. Here is the breakdown based on the current 220-1201 and 220-1202 objectives.


1. Implement Strong Encryption (The Priority)

This is the most critical hardening step. You must know the difference between these protocols for the exam:

  • WPA3: The current gold standard. Uses SAE (Simultaneous Authentication of Equals) to prevent offline dictionary attacks.

  • WPA2 (AES): The minimum standard for modern networks. Uses AES (Advanced Encryption Standard), which is significantly more secure than the older TKIP.

  • Avoid WEP and WPA: These are deprecated. If you see them as options in a scenario-based question for "securing a network," they are almost always the wrong answer.

2. Change Default Credentials

Every router comes with a default username (often "admin") and password ("password" or "admin").

  • Hardening Action: Change the Administrator password immediately. This prevents an attacker who joins the Wi-Fi from taking full control of the hardware.

3. SSID Management

  • Change the Default SSID: Default names (like "Linksys" or "Netgear") reveal the hardware manufacturer, making it easier for attackers to look up specific vulnerabilities.

  • SSID Broadcasting: You can disable the broadcast so the network name doesn't show up in "Available Networks."

    • Exam Note: CompTIA acknowledges that this is "security through obscurity" and not a primary defense, as scanners can still find "hidden" networks.

4. Disable Vulnerable Features

Modern routers come with "convenience" features that are major security risks:

  • WPS (Wi-Fi Protected Setup): Designed to connect devices with a button press or 8-digit PIN. The PIN method is easily cracked via brute force. Recommendation: Disable WPS.

  • UPnP (Universal Plug and Play): Allows devices to automatically open ports in the firewall. This can allow malware to create a "hole" into your network. Recommendation: Disable UPnP.

5. Physical and Logical Isolation

  • Guest Network: Create a separate SSID for visitors. Ensure Intra-BSS isolation is enabled so guests cannot "see" or attack other devices on the same network, and keep them logically separated from your main business/private network.

  • MAC Filtering: You can create a "Whitelist" of approved MAC addresses.

    • Exam Note: Like SSID hiding, this is a weak defense because MAC addresses can be easily spoofed.

6. Maintenance & Updates

  • Firmware Updates: Manufacturers release patches for security vulnerabilities (like the Krack or Dragonblood attacks). Hardening requires checking for and applying these updates regularly.

  • Radio Power Levels: On some high-end SOHO routers, you can decrease the radio power so the signal doesn't leak too far into the parking lot or street, reducing the physical "attack surface."


Exam Tip: The "SOHO Scenario"

If you get a Performance-Based Question (PBQ) asking you to configure a wireless router:

  1. Change the Admin Password first.

  2. Set Encryption to WPA3 (or WPA2-AES if WPA3 isn't available).

  3. Disable WPS.

  4. Change the SSID.