The correct answer is C. MAC address of the attacker.
DHCP (Dynamic Host Configuration Protocol) logs can provide valuable information when investigating a wireless attack, including:
The MAC (Media Access Control) address of the attacker's device
The IP address assigned to the attacker's device
The timestamp of when the attacker's device connected to the network
The duration of the attacker's connection
DHCP logs can help investigators identify the attacker's device, track their network activity, and correlate with other log data to reconstruct the attack.
From DHCP logs, the investigator can obtain:
C. MAC address of the attacker.
DHCP logs record the MAC addresses of devices that request IP addresses from the DHCP server. This information can be crucial in identifying the physical devices involved in a wireless attack
upvoted 1 times
...
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
aqeel1506
4 months, 1 week agoaqeel1506
4 months, 1 week ago