Victor wants to use Wireless Zero Configuration (WZC) to establish a wireless network connection using his computer running on Windows XP operating system. Which of the following are the most likely threats to his computer? Each correct answer represents a complete solution. Choose two. A. Attacker can use the Ping Flood DoS attack if WZC is used. B. Attacker by creating a fake wireless network with high power antenna cause Victor's computer to associate with his network to gain access. C. Information of probing for networks can be viewed using a wireless analyzer and may be used to gain access. D. It will not allow the configuration of encryption and MAC filtering. Sending information is not secure on wireless network. Â Suggested Answer: BC This question is in GISF exam For getting GIAC Information Security Fundamentals (GISF) Certificate Disclaimers: The website is not related to, affiliated with, endorsed or authorized by GIAC. Trademarks, certification & product names are used for reference only and belong to GIAC.
Please login or Register to submit your answer