Multiple Choice
What is the man-in-the-middle threat for wireless LANs?
A) The attacker impersonates an authorized user and gains certain unauthorized privileges to the wireless network.
B) The attacker passively monitors wireless networks for data,including authentication credentials.
C) The attacker steals or makes unauthorized use of a service.
D) The attacker actively intercepts communications between wireless clients and access points to obtain authentication credentials and data.
Correct Answer:

Verified
Correct Answer:
Verified
Q59: A wireless network is comprised of access
Q60: Within a WAN,a router would perform which
Q61: Which of the following is not one
Q62: Which of the following approaches and/or tools
Q63: What are the general security objectives for
Q64: Which of the following describes a group
Q66: An embedded audit module is a programmed
Q67: A Virtual private network (VPN)is a private
Q68: What are the benefits of conducting continuous
Q69: Which type of audit test would utilize