EC-Council: Computer Hacking Forensic Investigator(CHFI-V10)
Module 8 : Network Forensics
         
Questions available : 133 You are not logged in.
Please Login for track your learning progress
   
 
Q. No: 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 |
Go to Question No.



Question No 0


If you want to share the link of this question, please click here to "Copy Question Link" and share that generated link. Link from URL may change in future.
 

   
Bookmark this Question
QID: 568  
   
Wireless access control attacks aim to penetrate a network by evading WLAN access control measures such as AP MAC filters and Wi-Fi port access controls. Which of the following wireless access control attacks allow the attacker to set up a rogue access point outside the corporate perimeter and then lure the employees of the organization to connect to it?


 
A:    Rogue access points
 
B:    Client mis-association
C:    MAC spoofing
 
D:    Ad hoc associations
 
         

 
 

Diffence opinion in Correct Answer or any comment?
Vote / Comment for correct Answer



Comunity Comments:

Pradeep Thomas on 26/02/2024
Opted Answer: B
As per CHFI training materials book definition a client misassociation attack begins when a client attaches to an access point that is not in their own network. Due to the manner in which wireless signals propagate through walls and other structures, a client system may detect an access point belonging to another network and attach to it, either accidently or intentionally. A wireless access point can be termed rogue if it has been installed within a WLAN without the authorization of the network administrator.

















WELCOME TO ONLINE EXAM PREPARATION SYSTEM

Certification Examinations