Which of the following statements about wireless security is not true?
A) SSIDs are broadcast multiple times and can be picked up fairly easily by sniffer programs.
B) Radio frequency bands are easy to scan.
C) An intruder who has associated with an access point by using the correct SSID is capable of accessing other resources on the network.
D) Intruders can force a user's NIC to associate with a rogue access point.
E) Bluetooth is the only wireless technology that is not susceptible to hacking by eavesdroppers.
E
You might also like to view...
Secondary data refers to information that is developed or gathered by the researcher specifically for the research project at hand
Indicate whether the statement is true or false
When Lois Frankel speaks of people who are unable to "overcome their strengths," she is referring to _____
a. people who are involved in lifelong learning b. people who are focused on the skills and routines that brought them success in the past, to the exclusion of developing new skills c. people who are aware of the need to build new strengths d. people who recognize that different situations can call for different sets of skills