Ah, I see what they're getting at now. Monitoring the wireless clients and looking for any connections to new APs would be a good way to spot the man-in-the-middle attack, even if the spoofed AP is trying to blend in.
I've got a good feeling about this one. The key is remembering the different configuration options in SAP Master Data Governance. I think B is the correct answer, but I'll double-check my work just to be sure.
I'm a bit unsure on this one. Is the UCS file also an option? I know that can capture a lot of system information, but I'm not sure if it's the best choice here.
upvoted 0 times
...
Log in to Pass4Success
Sign in:
Report Comment
Is the comment made by USERNAME spam or abusive?
Commenting
In order to participate in the comments you need to be logged-in.
You can sign-up or
login
Roslyn
5 months agoShawn
5 months agoPrincess
6 months agoKirk
6 months agoVanesa
6 months agoLashunda
6 months agoTamesha
6 months agoKaitlyn
6 months agoScarlet
6 months agoBettye
6 months agoMarge
6 months agoNorah
6 months ago