Chapter 9, Wireless Penetrating Testing Methodology

Question

Answer

1)

d) It is non-trivial to detect rogue access points and using simple bindings like IP and MAC will not work in most cases.

2)

a) If the user has to approve every access point before a connecting to it, then most mis-association attacks could be prevented.

3)

d) A severe defect in an important device on the network would be the most important vulnerability to fix.

4)

c) The P option is for making airbase-ng respond to all probes.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.118.1.232