Question: Question 2 8 ( 2 points ) When planning a cyberattack, attackers will spend a great deal of time profiling a network and organization, probing

Question 28(2 points)
When planning a cyberattack, attackers will spend a great deal of time profiling a network and organization, probing for clues to the systems and devices deployed on the network. What is the first step in the planning phase of an attack?
Question 28 options:
Capture packets traversing the air interface
Gather Layer 2 network information, such as media access control (MAC) addresses and service set identifiers (SSIDs)
Plan the actual tactics of the attack that will allow them to associate with a specific access point
Use wireless scanning software to detect the presence of a poorly deployed 802.11 wireless network

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!