Which four of these attacks or wireless tools can the standard IDS signatures on a wireless LAN controller detect?

Which four of these attacks or wireless tools can the standard IDS signatures on a
wireless LAN controller detect? (Choose four.)

Which four of these attacks or wireless tools can the standard IDS signatures on a
wireless LAN controller detect? (Choose four.)

A.
long HTTP request

B.
SYN flood

C.
Deauthorization flood

D.
NetStumbler

E.
Wellenreiter

F.
Association flood

G.
AirSnort

H.
Fragment Overlap attack



Leave a Reply 0

Your email address will not be published. Required fields are marked *