List of questions
Related questions
Question 315 - 312-49v10 discussion
Wireless access control attacks aim to penetrate a network by evading WLAN access control measures such as AP MAC filters and Wi-Fi port access controls. Which of the following wireless access control attacks allow the attacker to set up a rogue access point outside the corporate perimeter and then lure the employees of the organization to connect to it?
A.
Ad hoc associations
B.
Client mis-association
C.
MAC spoofing
D.
Rogue access points
Your answer:
0 comments
Sorted by
Leave a comment first