ECCouncil Computer Hacking Forensic Investigator 312-49 Question # 17 Topic 2 Discussion

ECCouncil Computer Hacking Forensic Investigator 312-49 Question # 17 Topic 2 Discussion

312-49 Exam Topic 2 Question 17 Discussion:
Question #: 17
Topic #: 2

Wireless access control attacks aim to penetrate a network by evading WLAN access control measures such as AP MAC filters and Wi-Fi port access controls. Which of the following wireless access control attacks allow the attacker to set up a rogue access point outside the corporate perimeter and then lure the employees of the organization to connect to it?


A.

Ad hoc associations


B.

Client mis-association


C.

MAC spoofing


D.

Rogue access points


Get Premium 312-49 Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.