Which of the following security attacks cannot be detec…
Which of the following security attacks cannot be detected by a WIPS solution of any kind? (Choose 2)
What kind of troubleshooting are you likely performing …
Given:
You are using a Wireless Aggregator utility to combine multiple packet captures. One capture exists for each of channels 1, 6 and 11. What kind of troubleshooting
are you likely performing with such a tool?
What is a primary criteria for a network to qualify as …
What is a primary criteria for a network to qualify as a Robust Security Network (RSN)?
what other three inputs must be collected with a protoc…
Given:
One of the security risks introduced by WPA2-Personal is an attack conducted by an authorized network user who knows the passphrase. In order to decrypt other
users’ traffic, the attacker must obtain certain information from the 4-way handshake of the other users. In addition to knowing the Pairwise Master Key (PMK) and
the supplicant’s address (SA), what other three inputs must be collected with a protocol analyzer to recreate encryption keys? (Choose 3)
What statement correctly pairs the type of WLAN attack …
Given:
WLAN attacks are typically conducted by hackers to exploit a specific vulnerability within a network. What statement correctly pairs the type of WLAN attack with the
exploited vulnerability? (Choose 3)
What kind of attack is described?
An attack is under way on the network. The attack is preventing users from accessing resources required for business operations, but the attacker has not gained
access to any files or data. What kind of attack is described?
what common wireless network attacks is this network po…
A WLAN is implemented using WPA-Personal and MAC filtering. To what common wireless network attacks is this network potentially vulnerable? (Choose 3)
what security measure can you implement given only the …
You are configuring seven APs to prevent common security attacks. The APs are to be installed in a small business and to reduce costs, the company decided to
install all consumer-grade wireless routers. The wireless routers will connect to a switch, which connects directly to the Internet connection providing 50
Mbps of Internet bandwidth that will be shared among 53 wireless clients and 17 wired clients. To ensure the wireless network is as secure as possible from
common attacks, what security measure can you implement given only the hardware referenced?
What likely scenario could have allowed the hacker to o…
Given:
John Smith uses a coffee shop’s Internet hot-spot (no authentication or encryption) to transfer funds between his checking and savings accounts at his bank’s
website. The bank’s website uses the HTTPS protocol to protect sensitive account information. While John was using the hot-spot, a hacker was able to obtain
John’s bank account user ID and password and exploit this information. What likely scenario could have allowed the hacker to obtain John’s bank account user ID
and password?
What statement is true concerning the use of Orthogonal…
What statement is true concerning the use of Orthogonal Frequency Division Multiplexing (OFDM) in IEEE
802.11 WLANs?