Which of the following is a methodology used by attackers to find wireless access points wherever they may be?

Posted by: Pdfprep Category: 210-250 Tags: , ,

Which of the following is a methodology used by attackers to find wireless access points wherever they may be?
A . War driving
B . Wireless LWAP scanning
C . Wireless driving
D . Wireless Aironet scanning

Answer: A

Leave a Reply

Your email address will not be published.