PrepAway - Latest Free Exam Questions & Answers

Author: seenagape

what other three inputs must be collected with a protoc…

Given:
One of the security risks introduced by WPA2-Personal is an attack conducted by an authorized network user who knows the passphrase. In order to decrypt other
users’ traffic, the attacker must obtain certain information from the 4-way handshake of the other users. In addition to knowing the Pairwise Master Key (PMK) and
the supplicant’s address (SA), what other three inputs must be collected with a protocol analyzer to recreate encryption keys? (Choose 3)

what security measure can you implement given only the …

You are configuring seven APs to prevent common security attacks. The APs are to be installed in a small business and to reduce costs, the company decided to
install all consumer-grade wireless routers. The wireless routers will connect to a switch, which connects directly to the Internet connection providing 50

Mbps of Internet bandwidth that will be shared among 53 wireless clients and 17 wired clients. To ensure the wireless network is as secure as possible from
common attacks, what security measure can you implement given only the hardware referenced?

What likely scenario could have allowed the hacker to o…

Given:
John Smith uses a coffee shop’s Internet hot-spot (no authentication or encryption) to transfer funds between his checking and savings accounts at his bank’s
website. The bank’s website uses the HTTPS protocol to protect sensitive account information. While John was using the hot-spot, a hacker was able to obtain
John’s bank account user ID and password and exploit this information. What likely scenario could have allowed the hacker to obtain John’s bank account user ID
and password?


Page 30 of 87« First...1020...2829303132...405060...Last »