3.0 Threats and Vulnerabilities


3.4 Analyze and differentiate among types of wireless attacks

  • Rogue access points
  • Interference
  • Evil twin
  • War driving
  • Bluejacking
  • Bluesnarfing
  • War chalking
  • IV attack
  • Packet sniffing

Recommended

 





Associates