What security vulnerabilities may result from a lack of staging, change management, and installation procedures for WLAN infrastructure equipment? (Choose 2)

What security vulnerabilities may result from a lack of staging, change management, and installation procedures for WLAN infrastructure equipment? (Choose 2)
A . The WLAN system may be open to RF Denial-of-Service attacks
B . WIPS may not classify authorized, rogue, and neighbor APs accurately
C . Authentication cracking of 64-bit Hex WPA-Personal PSK
D . Management interface exploits due to the use of default usernames and passwords for AP management
E . AES-CCMP encryption keys may be decrypted

Answer: BD

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments