Which of the following are true about wireless security systems? (Choose all that apply.)
A) a method used by WIDS is anomaly-based monitoring
B) WIPS can prevent an attack while WIDS cannot
C) WIPS is dependent on signatures
D) passive WIDS can configure the firewall if an attack is detected
Correct Answer:
Verified
Q20: It is important that the entire RF
Q21: Describe a dictionary attack.
Q22: Which of the following are TKIP enhancement
Q23: A WIDS/WIPS that uses a(n)_ sensor uses
Q24: What were three weaknesses in WEP identified
Q26: Name and describe the two types of
Q27: Briefly describe RADIUS and mention a strength
Q28: Describe the three areas of enhancement provided
Q29: What is EAP?
Q30: What are the three major components in
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents