In order to acquire credentials of a valid user on a public hotspot network, what attacks may be conducted? Choose the single completely correct answer.

Posted by: Pdfprep Category: CWSP-206 Tags: , ,

In order to acquire credentials of a valid user on a public hotspot network, what attacks may be conducted? Choose the single completely correct answer.
A . MAC denial of service and/or physical theft
B . Social engineering and/or eavesdropping
C . Authentication cracking and/or RF DoS
D . Code injection and/or XSS
E . RF DoS and/or physical theft

Answer: B

Leave a Reply

Your email address will not be published.