Which of the following should the technician do to gather information about the configuration of the wireless network?

A security technician is attempting to access a wireless network protected with WEP. The
technician does not know any information about the network. Which of the following should the
technician do to gather information about the configuration of the wireless network?

A security technician is attempting to access a wireless network protected with WEP. The
technician does not know any information about the network. Which of the following should the
technician do to gather information about the configuration of the wireless network?

A.
Spoof the MAC address of an observed wireless network client

B.
Ping the access point to discover the SSID of the network

C.
Perform a dictionary attack on the access point to enumerate the WEP key

D.
Capture client to access point disassociation packets to replay on the local PC’s loopback



Leave a Reply 0

Your email address will not be published. Required fields are marked *