Exam4Training

What would be the intended purpose of simulating Layer 2 deauthentication attacks as part of a WLAN audit?

What would be the intended purpose of simulating Layer 2 deauthentication attacks as part of a WLAN audit?
A . Audit Layer 1
B . Audit Layer 2
C . Audit the wired infrastructure
D . Audit the WIPS

Answer: D

Exit mobile version