ECCouncil Exam Questions

Which of the following wireless access control attacks allows the attacker to set up a rogue access

Wireless access control attacks aim to penetrate a network by evading WLAN access control
measures, such as AP MAC filters and Wi-Fi port access controls.
Which of the following wireless access control attacks allows the attacker to set up a rogue access
point outside the corporate perimeter, and then lure the employees of the organization to connect
to it?

A.
War driving

B.
Rogue access points

C.
MAC spoofing

D.
Client mis-association