What would be the intended purpose of simulating Layer 2 deauthentication attacks as part of a WLAN audit?
A . Audit Layer 1
B . Audit Layer 2
C . Audit the wired infrastructure
D . Audit the WIPS
Answer: D
Latest CWSP-207 Dumps Valid Version with 440 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund