Victor wants to use Wireless Zero Configuration (WZC) to establish a wireless network connection
using his computer running on Windows XP operating system. Which of the following are the most
likely threats to his computer?
Each correct answer represents a complete solution. Choose two.
A.
Information of probing for networks can be viewed using a wireless analyzer and may be used
to gain access.
B.
Attacker can use the Ping Flood DoS attack if WZC is used.
C.
Attacker by creating a fake wireless network with high power antenna cause Victor’s computer
to associate with his network to gain access.
D.
It will not allow the configuration of encryption and MAC filtering. Sending information is not
secure on wireless network.
Explanation: