exam questions

Exam 412-79v8 All Questions

View all questions & answers for the 412-79v8 exam

Exam 412-79v8 topic 1 question 31 discussion

Actual exam question from ECCouncil's 412-79v8
Question #: 31
Topic #: 1
[All 412-79v8 Questions]

A wireless intrusion detection system (WIDS) monitors the radio spectrum for the presence of unauthorized, rogue access points and the use of wireless attack tools. The system monitors the radio spectrum used by wireless LANs, and immediately alerts a systems administrator whenever a rogue access point is detected.
Conventionally it is achieved by comparing the MAC address of the participating wireless devices.
Which of the following attacks can be detected with the help of wireless intrusion detection system (WIDS)?

  • A. Social engineering
  • B. SQL injection
  • C. Parameter tampering
  • D. Man-in-the-middle attack
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️
Reference: http://www.infosecwriters.com/text_resources/pdf/Wireless_IDS_JDixon.pdf (page 5)

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Currently there are no comments in this discussion, be the first to comment!
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...