What would be the intended purpose of simulating Layer 2 deauthentication attacks as part of a WLAN audit?

What would be the intended purpose of simulating Layer 2 deauthentication attacks as part of a WLAN audit?
A . Audit Layer 1
B . Audit Layer 2
C . Audit the wired infrastructure
D . Audit the WIPS

Answer: D

Latest CWSP-207 Dumps Valid Version with 440 Q&As

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments