A consultant is hired to scan a large multi-tenant site for hidden wireless devices. The client requests a solution that can passively capture data across many channels, reducing the likelihood of detection. Which approach satisfies this need?
Manually connect to each broadcast to confirm suspect activity
Initiate repeated deauthentication transmissions to reveal hidden beacons
Use Kismet to monitor channels quietly for unauthorized signals
Attempt numerous connection requests to detect concealed networks
Kismet is a passive scanning system that does not inject traffic, minimizing exposure while collecting data across several channels. The other options involve access-point interactions such as deauthentication or connection attempts, which risk detection or miss dormant devices that do not respond to active scans.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is Kismet and how does it work?
Open an interactive chat with Bash
Why is passive scanning preferred over active scanning in this scenario?
Open an interactive chat with Bash
What are hidden wireless devices and why are they a security concern?