Victor wants to use Wireless Zero Configuration (WZC) to establish a wireless network connection using his
computer running on Windows XP operating system. Which of the following are the most likely threats to his
Each correct answer represents a complete solution. Choose two.
A. Attacker can use the Ping Flood DoS attack if WZC is used.
B. Information of probing for networks can be viewed using a wireless analyzer and may be used to gain
C. Attacker by creating a fake wireless network with high power antenna cause Victor’s computer to associate
with his network to gain access.
D. It will not allow the configuration of encryption and MAC filtering. Sending information is not secure on