Exam4Training

Which of the following wireless access control attacks allows the attacker to set up a rogue access point outside the corporate perimeter, and then lure the employees of the organization to connect to it?

Wireless access control attacks aim to penetrate a network by evading WLAN access control measures, such as AP MAC filters and Wi-Fi port access controls.

Which of the following wireless access control attacks allows the attacker to set up a rogue access point outside the corporate perimeter, and then lure the employees of the organization to connect to it?
A . War driving
B . Rogue access points
C . MAC spoofing
D . Client mis-association

Answer: D

Latest 312-49v9 Dumps Valid Version with 547 Q&As

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund

Exit mobile version