List of questions
Related questions
Question 28 - CWSP-207 discussion
In order to acquire credentials of a valid user on a public hot-spot network, what attacks may be conducted? Choose the single completely correct answer.
A.
Social engineering and/or eavesdropping
B.
RF DoS and/or physical theft
C.
MAC denial of service and/or physical theft
D.
Authentication cracking and/or RF DoS
E.
Code injection and/or XSS
Your answer:
0 comments
Sorted by
Leave a comment first