Question |
Answer |
---|---|
1) |
d) It is non-trivial to detect rogue access points and using simple bindings like IP and MAC will not work in most cases. |
2) |
a) If the user has to approve every access point before a connecting to it, then most mis-association attacks could be prevented. |
3) |
d) A severe defect in an important device on the network would be the most important vulnerability to fix. |
4) |
c) The |
18.118.1.232