C. RF DoS attacks use signal jamming or interference to prevent communication.
D. Hijacking uses deauthentication and re-association to force users onto rogue APs.
E. Social engineering uses manipulation to acquire credentials or sensitive information.
Incorrect:
A. Management interface exploit attacks typically involve web or CLI interface vulnerabilities, not social engineering.
B. Zero-day attacks are based on unknown vulnerabilities, not just limited to authentication or encryption.
F. Association flood attacks occur at Layer 2, not Layer 3.
[References:, , CWSP-208 Study Guide, Chapter 5 (Types of Wireless Attacks), , CWNP Security Essentials – WLAN Threat Matrix, , CWNP Whitepapers on Rogue APs and Social Engineering, , =========================]
Submit