Wireless Intrusion Prevention Systems (WIPS) are excellent for detecting on-air threats such as rogue APs, DoS attacks, spoofing, and misconfigured devices. However, WIPS cannot detect:
C. Eavesdropping — Passive listening on wireless transmissions cannot be detected because no signal is transmitted by the attacker.
D. Social engineering — Human-based attacks like phishing or pretexting fall outside the scope of wireless monitoring.
Incorrect:
A. Rogue APs can be detected via MAC address comparison, frame analysis, and signal triangulation.
B. DoS attacks, such as deauth floods or RF jamming, can be detected with appropriate WIPS sensors.
[References:, , CWSP-208 Study Guide, Chapter 5 (WLAN Threats and Attacks), , CWNP WIPS Implementation Guidelines, , CWNP Whitepapers on Wireless Threat Detection Capabilities, ]
Submit