اختبار شهادة Certified Ethical Hacker (CEH) V13

السؤال 285 من 339

كل الأسئلة

An attacker installs a rogue access point within an organization’s perimeter to break into the internal network. The auditor detects unusual wireless traffic, disables the affected network, and tests for weak or outdated wireless security. What type of vulnerability assessment is being performed?

الخيارات

  • A Distributed assessment
  • B Wireless network assessment
  • C Host-based assessment
  • D Application assessment

النقاشات

لا توجد نقاشات منشورة لهذا السؤال حالياً.