Multiple Choice
In a(n) __________ situation, a wireless device is configured to appear to be a legitimate access point, enabling the operator to steal passwords
From legitimate users and then penetrate a wired network through a legitimate wireless access point.
A) malicious association
B) identiy theft
C) network injection
D) ad hoc network
Correct Answer:

Verified
Correct Answer:
Verified
Q8: MAC spoofing occurs when an attacker is
Q9: the _ is used to ensure the
Q10: the smallest building block of a wireless
Q11: the actual method of key generation depends
Q12: the _ function is the logical function
Q14: the _ layer is responsible for detecting
Q15: the _ layer keeps track of which
Q16: A _ is any device that contains
Q17: A _ attack occurs when an attacker
Q18: the use of 802.1X cannot prevent rogue