Question: Question 2 8 ( 2 points ) When planning a cyberattack, attackers will spend a great deal of time profiling a network and organization, probing
Question points
When planning a cyberattack, attackers will spend a great deal of time profiling a network and organization, probing for clues to the systems and devices deployed on the network. What is the first step in the planning phase of an attack?
Question options:
Capture packets traversing the air interface
Gather Layer network information, such as media access control MAC addresses and service set identifiers SSIDs
Plan the actual tactics of the attack that will allow them to associate with a specific access point
Use wireless scanning software to detect the presence of a poorly deployed wireless network
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
