Which of the following is usually set up by a hacker outside the building?
A) a rogue access point
B) an evil twin access point
C) both A and B
D) neither A nor B
Correct Answer:
Verified
Q22: 802.11i can defeat rogue access points.
Q23: If a company uses 802.11i for its
Q24: An evil twin access point is usually
Q25: Selecting locations for access points first involves
Q26: You should use a VPN _.
A) if
Q28: Site surveys should be done _.
A) after
Q29: Which of the following secures communication between
Q30: Centralized access point management _.
A) increases management
Q31: A security might use SNMP Get commands
Q32: What initial authentication mode does 802.11i use?
A)
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents