اختبار شهادة Certified Ethical Hacker (CEH) V13

السؤال 341 من 428

كل الأسئلة

A rogue access point is discovered inside an organization’s perimeter, and the auditor analyzes weak or outdated wireless security and authentication mechanisms open to attack. What type of vulnerability assessment is being performed?

الخيارات

  • A Host-based assessment
  • B Wireless Network Assessment‎
  • C Application assessment
  • D Distributed assessment

النقاشات

لا توجد نقاشات منشورة لهذا السؤال حالياً.