Which of the following is a methodology used by attackers to find wireless access points wherever they may be?
A . War driving
B . Wireless LWAP scanning
C . Wireless driving
D . Wireless Aironet scanning
Answer: A
Which of the following is a methodology used by attackers to find wireless access points wherever they may be?
A . War driving
B . Wireless LWAP scanning
C . Wireless driving
D . Wireless Aironet scanning
Answer: A