Which of the following steps should the tester take NEXT?

A penetration tester has been contracted to review wireless security. The tester has deployed a malicious wireless AP that mimics the configuration of the target enterprise WiFi. The penetration tester now wants to try to force nearby wireless stations to connect to the malicious AP.

Which of the following steps should the tester take NEXT?
A . Send deauthentication frames to the stations.
B . Perform jamming on all 2.4GHz and 5GHz channels.
C . Set the malicious AP to broadcast within dynamic frequency selection channels.
D . Modify the malicious AP configuration to not use a pre-shared key.

Answer: A

Explanation:

https://steemit.com/informatica/@jordiurbina1/tutorial-hacking-wi-fi-wireless-networks-with-wifislax

Latest PT0-002 Dumps Valid Version with 110 Q&As

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments