A network security administrator is trying to determine how an attacker gained access to the corporate wireless network. The network is configured with SSID broadcast disabled. The senior network administrator explains that this configuration setting would only have determined an unsophisticated attacker because of which of the following?
A. The SSID can be obtained with a wireless packet analyzer
B. The required information can be brute forced over time
C. Disabling the SSID only hides the network from other WAPs
D. The network name could be obtained through a social engineering campaign
Answer: A. The SSID can be obtained with a wireless packet analyzer
You might also like to view...
A(n) ________ name is the host name of the recipient's mail server
A) cloud B) domain C) Web D) user
The Increase Font Size button appears on the ____ tab.
A. Fonts B. Home C. Styles D. Layouts
The algorithms to implement the operations search, insert, and remove are the same for sorted and unsorted lists.
Answer the following statement true (T) or false (F)
The Significance argument in a PERCENTRANK function is the input for confidence intervals.
Answer the following statement true (T) or false (F)