What software and hardware tools are used in the process performed to hijack a wireless station from the authorized wireless network onto an unauthorized wireless network?
A . A low-gain patch antenna and terminal emulation software
B . MAC spoofing software and MAC DoS software
C . RF jamming device and a wireless radio card
D . A wireless workgroup bridge and a protocol analyzer
Answer: C
Latest CWSP-207 Dumps Valid Version with 440 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund