a. Who creates a rogue access point? 7a1.) An unauthorized internal access point is a(n) ______ access

Question:

a. Who creates a rogue access point?

7a1.) An unauthorized internal access point is a(n) ______ access point.

a. Evil twin

b. Shadow

c. Rogue

d. None of the above


7a2.) A rogue access point usually is created by  ______.

a. An employee

b. An external attacker

c. The IT security department

d. An evil twin


b. Why can they defeat 802.11i security?

7b.) 802.11i can defeat rogue access points.

a. True

b. False


c. Do employees who set up rogue access points have malicious motives?

7c.) Employees who set up rogue access points usually have malicious motives.

a. True

b. False

Fantastic news! We've Found the answer you've been seeking!

Step by Step Answer:

Related Book For  book-img-for-question

Business Data Networks and Security

ISBN: 978-0134817125

11th Edition

Authors: Raymond R. Panko, Julia L. Panko

Question Posted: