Ah, I see what they're getting at now. Monitoring the wireless clients and looking for any connections to new APs would be a good way to spot the man-in-the-middle attack, even if the spoofed AP is trying to blend in.
I've got a good feeling about this one. The key is remembering the different configuration options in SAP Master Data Governance. I think B is the correct answer, but I'll double-check my work just to be sure.
I'm a bit unsure on this one. Is the UCS file also an option? I know that can capture a lot of system information, but I'm not sure if it's the best choice here.
upvoted 0 times
...
Log in to Pass4Success
Sign in:
Report Comment
Is the comment made by USERNAME spam or abusive?
Commenting
In order to participate in the comments you need to be logged-in.
You can sign-up or
login
Roslyn
4 months agoShawn
4 months agoPrincess
4 months agoKirk
4 months agoVanesa
4 months agoLashunda
5 months agoTamesha
5 months agoKaitlyn
5 months agoScarlet
5 months agoBettye
5 months agoMarge
5 months agoNorah
5 months ago