PrepAway - Latest Free Exam Questions & Answers

Which of the following wireless attacks would this address?

Pete, the security engineer, would like to prevent wireless attacks on his network. Pete has implemented a security control to limit the connecting MAC addresses to a single port. Which of the following wireless attacks would this address?

PrepAway - Latest Free Exam Questions & Answers

A.
Interference

B.
Man-in-the-middle

C.
ARP poisoning

D.
Rogue access point

2 Comments on “Which of the following wireless attacks would this address?

  1. meac says:

    INCORRECT ANSWERS:
    A.Interference: Wi-Fi Interference will occur during active call time. … Some other wireless devices operating in 2.4 GHz or 5 GHz spectrum, including microwave transmitters, wireless cameras can also contribute to wireless interference
    B.Man-in-the-middle – In cryptography and computer security, a man-in-the-middle attack (MITM) is an attack where the attacker secretly relays and possibly alters the communication between two parties who believe they are directly communicating with each other. This can happen in a wire or wireless connection but it is not a direct attack on the connection as such.
    C.ARP poisoning – or ARP spoofing is a type of attack in which a malicious actor sends falsified ARP (Address Resolution Protocol) messages over a local area network. This results in the linking of an attacker’s MAC address with the IP address of a legitimate computer or server on the network.
    So this leaves D as the only possible answer:
    D.Rogue access point – A Rogue Access Point (Rogue AP) is a wireless access point installed on a wired enterprise network without authorization from the network administrator. A Rogue AP may be naively installed by a legitimate user who is unaware of its security implications or it could be deliberately installed as an insider attack.

    key word: limit the connecting MAC addresses to a single port. This means that all connections converge to a single point.

    • MAC filtering is typically used in wireless networks. In computer networking
    • MAC Filtering (or GUI filtering, or layer 2 address filtering) refers to a security access control method whereby the 48-bit address assigned to each network card is used to determine access to the network.
    • MAC addresses are uniquely assigned to each card, so using MAC filtering on a network permits and denies network access to specific devices through the use of blacklists and whitelists.

    In this Question , a rogue access point would need to be able to connect to the network to provide access to network resources.
    If the MAC address of the rogue access point isn’t allowed to connect to the network port, then the rogue access point will not be able to connect to the network.




    0



    0

Leave a Reply