ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 279 - 312-49v10 discussion

Report
Export

When investigating a wireless attack, what information can be obtained from the DHCP logs?

A.
The operating system of the attacker and victim computers
Answers
A.
The operating system of the attacker and victim computers
B.
IP traffic between the attacker and the victim
Answers
B.
IP traffic between the attacker and the victim
C.
MAC address of the attacker
Answers
C.
MAC address of the attacker
D.
If any computers on the network are running in promiscuous mode
Answers
D.
If any computers on the network are running in promiscuous mode
Suggested answer: C
asked 18/09/2024
Allam Sunandhareddy
34 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first