A wireless intrusion detection system (WIDS) monitors the radio spectrum for the presence
of unauthorized, rogue access points and the use of wireless attack tools. The system
monitors the radio spectrum used by wireless LANs, and immediately alerts a systems
administrator whenever a rogue access point is detected. Conventionally it is achieved by
comparing the MAC address of the participating wireless devices. Which of the following
attacks can be detected with the help of wireless intrusion detection system (WIDS)?
A.
Social engineering
B.
SQL injection
C.
Parameter tampering
D.
Man-in-the-middle attack
Explanation:
Reference:
http://www.infosecwriters.com/text_resources/pdf/Wireless_IDS_JDixon.pdf(page 5)
D