Which four of these attacks or wireless tools can the standard IDS signatures on a wireless LAN controller detect? (Choose four)
A.
Association flood
B.
SYN flood
C.
NetStumbler
D.
Fragment Overlap attack
E.
Deautheorization flood
F.
Long HTTP request
G.
AirSnort
H.
Wellenreiter
Looks good, backup:
http://www.cisco.com/en/US/tech/tk722/tk809/technologies_tech_note09186a008063e5d0.shtml