Using a wireless sniffer to capture traffic and WEP cracking are examples of what types of attacks?
a. Warchalking
b. Eavesdropping
c. Open authentication
d. Rouge access point
ANS: B
Computer Science & Information Technology
You might also like to view...
Press ________ to start a slide show from the beginning of a presentation
A) F12 B) F11 C) F1 D) F5
Computer Science & Information Technology
When you want to create a chart you first need to select a data ________
Fill in the blank(s) with correct word
Computer Science & Information Technology