PdfPrep.com

Which of the following is a methodology used by attackers to find wireless access points wherever they may be?

Which of the following is a methodology used by attackers to find wireless access points wherever they may be?
A . War driving
B . Wireless LWAP scanning
C . Wireless driving
D . Wireless Aironet scanning

Answer: A

Exit mobile version