GAQM Related Exams
CEH-001 Exam
Which system consists of a publicly available set of databases that contain domain name registration contact information?
In order to attack a wireless network, you put up an access point and override the signal of the real access point. As users send authentication data, you are able to capture it. What kind of attack is this?