What software and hardware tools are used together to hijack a wireless station from the authorized wireless network onto an unauthorized wireless network? (Choose 2)
A.
RF jamming device and a wireless radio card
B.
A low-gain patch antenna and terminal emulation software
C.
A wireless workgroup bridge and a protocol analyzer
Chosen Answer:
This is a voting comment (?). You can switch to a simple comment. It is better to Upvote an existing comment if you don't have anything to add.
Submit