Which of the following wireless access control attacks allows the attacker…?

Wireless access control attacks aim to penetrate a network by evading WLAN access control
measures, such as AP MAC filters and Wi-Fi port access controls. Which of the following wireless
access control attacks allows the attacker to set up a rogue access point outside the corporate
perimeter, and then lure the employees of the organization to connect to it?

Wireless access control attacks aim to penetrate a network by evading WLAN access control
measures, such as AP MAC filters and Wi-Fi port access controls. Which of the following wireless
access control attacks allows the attacker to set up a rogue access point outside the corporate
perimeter, and then lure the employees of the organization to connect to it?

A.
War driving

B.
Client mis-association

C.
MAC spoofing

D.
Rogue access points



Leave a Reply 0

Your email address will not be published. Required fields are marked *