What software and hardware tools are used in the process performed to hijack a wireless station from the authorized wireless network onto an unauthorized wireless network?

What software and hardware tools are used in the process performed to hijack a wireless station from the authorized wireless network onto an unauthorized wireless network?
A . A low-gain patch antenna and terminal emulation software
B . MAC spoofing software and MAC DoS software
C . RF jamming device and a wireless radio card
D . A wireless workgroup bridge and a protocol analyzer

Answer: C

Latest CWSP-206 Dumps Valid Version with 60 Q&As

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments