Using a wireless sniffer to capture traffic and WEP cracking are examples of what types of attacks?

a. Warchalking
b. Eavesdropping
c. Open authentication
d. Rouge access point

ANS: B

Computer Science & Information Technology

You might also like to view...

Press ________ to start a slide show from the beginning of a presentation

A) F12 B) F11 C) F1 D) F5

Computer Science & Information Technology

When you want to create a chart you first need to select a data ________

Fill in the blank(s) with correct word

Computer Science & Information Technology