a. Who creates a rogue access point? 7a1.) An unauthorized internal access point is a(n) ______ access
Question:
a. Who creates a rogue access point?
7a1.) An unauthorized internal access point is a(n) ______ access point.
a. Evil twin
b. Shadow
c. Rogue
d. None of the above
7a2.) A rogue access point usually is created by ______.
a. An employee
b. An external attacker
c. The IT security department
d. An evil twin
b. Why can they defeat 802.11i security?
7b.) 802.11i can defeat rogue access points.
a. True
b. False
c. Do employees who set up rogue access points have malicious motives?
7c.) Employees who set up rogue access points usually have malicious motives.
a. True
b. False
Fantastic news! We've Found the answer you've been seeking!
Step by Step Answer:
Related Book For
Business Data Networks and Security
ISBN: 978-0134817125
11th Edition
Authors: Raymond R. Panko, Julia L. Panko
Question Posted: