What software and hardware tools are used in the process performed to hijack a wireless  station from the authorized wireless network onto an unauthorized wireless network?

What software and hardware tools are used in the process performed to hijack a wireless  station from the authorized wireless network onto an unauthorized wireless network?
A . A low-gain patch antenna and terminal emulation software
B . MAC spoofing software and MAC DoS software
C . RF jamming device and a wireless radio card
D . A wireless workgroup bridge and a protocol analyzer

Answer: C

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments