PdfPrep.com

What software and hardware tools are used in the process performed to hijack a wireless station from the authorized wireless network onto an unauthorized wireless network?

What software and hardware tools are used in the process performed to hijack a wireless station from the authorized wireless network onto an unauthorized wireless network?
A . A low-gain patch antenna and terminal emulation software
B . MAC spoofing software and MAC DoS software
C . RF jamming device and a wireless radio card
D . A wireless workgroup bridge and a protocol analyzer

Answer: C

Exit mobile version