Victor wants to use Wireless Zero Configuration (WZC) to establish a wireless network connection using his computer running on Windows XP operating system. Which of the following are the most likely threats to his computer? Each correct answer represents a complete solution. Choose two.

QuestionsCategory: GISFVictor wants to use Wireless Zero Configuration (WZC) to establish a wireless network connection using his computer running on Windows XP operating system. Which of the following are the most likely threats to his computer? Each correct answer represents a complete solution. Choose two.
Admin Staff asked 6 months ago
Victor wants to use Wireless Zero Configuration (WZC) to establish a wireless network connection using his computer running on Windows XP operating system. Which of the following are the most likely threats to his computer?
Each correct answer represents a complete solution. Choose two.

A. Attacker can use the Ping Flood DoS attack if WZC is used.

B. Attacker by creating a fake wireless network with high power antenna cause Victor's computer to associate with his network to gain access.

C. Information of probing for networks can be viewed using a wireless analyzer and may be used to gain access.

D. It will not allow the configuration of encryption and MAC filtering. Sending information is not secure on wireless network.








 

Suggested Answer: BC



This question is in GISF exam 
For getting GIAC Information Security Fundamentals (GISF) Certificate

Disclaimers:
The website is not related to, affiliated with, endorsed or authorized by GIAC.
Trademarks, certification & product names are used for reference only and belong to GIAC.

Next Post

Recommended

Welcome Back!

Login to your account below

Create New Account!

Fill the forms below to register

Retrieve your password

Please enter your username or email address to reset your password.