Prev Question

Victor wants to use Wireless Zero Configuration (WZC) to establish a wireless network connection using his
computer running on Windows XP operating system. Which of the following are the most likely threats to his
computer?
Each correct answer represents a complete solution. Choose two.

A. Attacker can use the Ping Flood DoS attack if WZC is used.

B. Information of probing for networks can be viewed using a wireless analyzer and may be used to gain
access.

C. Attacker by creating a fake wireless network with high power antenna cause Victor’s computer to associate
with his network to gain access.

D. It will not allow the configuration of encryption and MAC filtering. Sending information is not secure on
wireless network.

Explanation:

Prev Question
Tagged:

Leave a Reply

Your email address will not be published. Required fields are marked *