Last Updated on August 16, 2021 by Admin 3
Wireless access control attacks aim to penetrate a network by evading WLAN access control measures such as AP MAC filters and Wi-Fi port access controls. Which of the following wireless access control attacks allow the attacker to set up a rogue access point outside the corporate perimeter and then lure the employees of the organization to connect to it?
- Ad hoc associations
- Client mis-association
- MAC spoofing
- Rogue access points