What would be the intended purpose of simulating Layer 2 deauthentication attacks as part of a WLAN audit?

What would be the intended purpose of simulating Layer 2 deauthentication attacks as part of a WLAN audit?
A . Audit Layer 1
B . Audit Layer 2
C . Audit the wired infrastructure
D . Audit the WIPS

Answer: D

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments