Why is a rogue AP a security vulnerability?
A. It uses the weaker IEEE 80211i protocol.
B. It conflicts with other network firewalls and can cause them to become disabled.
C. It allows an attacker to bypass network security configurations.
D. It requires the use of vulnerable wireless probes on all mobile devices.
Ans: C. It allows an attacker to bypass network security configurations.
You might also like to view...
The ____________________ function is can be used to check for palindromes because it reverses the characters in a string.
Fill in the blank(s) with the appropriate word(s).
Suppose that alpha is an int variable and ch is a char variable. The input is: ? 17 A ? What are the values after the following statements execute? ? cin >> alpha; cin >> ch; ?
A. alpha = 17, ch = ' ' B. alpha = 1, ch = 7 C. alpha = 17, ch = 'A' D. alpha = 17, ch = 'a'
In which of the following social networking sites are you most likely to find professionals who seek to make business-related connections?
A. LinkedIn B. Facebook C. Google+ D. MySpace
Most people are taught using a(n) ____ approach, which comes from a Greek word meaning to lead a child.
A. pedagogical B. neurological C. visual D. kinesthetic