A network security administrator is trying to determine how an attacker gained access to the corporate wireless network. The network is configured with SSID broadcast disabled. The senior network administrator explains that this configuration setting would only have determined an unsophisticated attacker because of which of the following?

A. The SSID can be obtained with a wireless packet analyzer
B. The required information can be brute forced over time
C. Disabling the SSID only hides the network from other WAPs
D. The network name could be obtained through a social engineering campaign


Answer: A. The SSID can be obtained with a wireless packet analyzer

Computer Science & Information Technology

You might also like to view...

A(n) ________ name is the host name of the recipient's mail server

A) cloud B) domain C) Web D) user

Computer Science & Information Technology

The Increase Font Size button appears on the ____ tab.

A. Fonts B. Home C. Styles D. Layouts

Computer Science & Information Technology

The algorithms to implement the operations search, insert, and remove are the same for sorted and unsorted lists.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

The Significance argument in a PERCENTRANK function is the input for confidence intervals.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology