Why is a rogue AP a security vulnerability?

A. It uses the weaker IEEE 80211i protocol.
B. It conflicts with other network firewalls and can cause them to become disabled.
C. It allows an attacker to bypass network security configurations.
D. It requires the use of vulnerable wireless probes on all mobile devices.


Ans: C. It allows an attacker to bypass network security configurations.

Computer Science & Information Technology

You might also like to view...

The ____________________ function is can be used to check for palindromes because it reverses the characters in a string.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Suppose that alpha is an int variable and ch is a char variable. The input is: ? 17 A ? What are the values after the following statements execute? ? cin >> alpha; cin >> ch; ?

A. alpha = 17, ch = ' ' B. alpha = 1, ch = 7 C. alpha = 17, ch = 'A' D. alpha = 17, ch = 'a'

Computer Science & Information Technology

In which of the following social networking sites are you most likely to find professionals who seek to make business-related connections?

A. LinkedIn B. Facebook C. Google+ D. MySpace

Computer Science & Information Technology

Most people are taught using a(n) ____ approach, which comes from a Greek word meaning to lead a child.

A. pedagogical B. neurological C. visual D. kinesthetic

Computer Science & Information Technology