• Post author:
  • Post category:Blog
  • Reading time:2 mins read
  • Post last modified:June 12, 2024

A penetration tester deploys a rogue AP in the target wireless infrastructure. What is the first step that has to be taken to force wireless clients to connect to the rogue AP?

  • send out false DNS beacons
  • spoof the MAC address of the rogue AP
  • set the PSK key to match the clients
  • send de-authentication frames to the clients
Explanation & Hints:

For more Questions and Answers:

Ethical Hacker Course Final Exam Answers Full 100%

Subscribe
Notify of
guest
0 Comments
Newest
Oldest Most Voted
Inline Feedbacks
View all comments