what attacks may be conducted?
In order to acquire credentials of a valid user on a public hot-spot network, what attacks may be conducted? Choose the single completely correct answer.
What statement best describes the likely ability to cap…
Given:
You have a Windows laptop computer with an integrated, dual-band, Wi-Fi compliant adapter. Your laptop computer has protocol analyzer software installed that is
capable of capturing and decoding 802.11ac data.
What statement best describes the likely ability to capture 802.11ac frames for security testing purposes?
Which of the following security attacks cannot be detec…
Which of the following security attacks cannot be detected by a WIPS solution of any kind? (Choose 2)
What kind of troubleshooting are you likely performing …
Given:
You are using a Wireless Aggregator utility to combine multiple packet captures. One capture exists for each of channels 1, 6 and 11. What kind of troubleshooting
are you likely performing with such a tool?
What is a primary criteria for a network to qualify as …
What is a primary criteria for a network to qualify as a Robust Security Network (RSN)?
what other three inputs must be collected with a protoc…
Given:
One of the security risks introduced by WPA2-Personal is an attack conducted by an authorized network user who knows the passphrase. In order to decrypt other
users’ traffic, the attacker must obtain certain information from the 4-way handshake of the other users. In addition to knowing the Pairwise Master Key (PMK) and
the supplicant’s address (SA), what other three inputs must be collected with a protocol analyzer to recreate encryption keys? (Choose 3)
What statement correctly pairs the type of WLAN attack …
Given:
WLAN attacks are typically conducted by hackers to exploit a specific vulnerability within a network. What statement correctly pairs the type of WLAN attack with the
exploited vulnerability? (Choose 3)
What kind of attack is described?
An attack is under way on the network. The attack is preventing users from accessing resources required for business operations, but the attacker has not gained
access to any files or data. What kind of attack is described?
what common wireless network attacks is this network po…
A WLAN is implemented using WPA-Personal and MAC filtering. To what common wireless network attacks is this network potentially vulnerable? (Choose 3)
what security measure can you implement given only the …
You are configuring seven APs to prevent common security attacks. The APs are to be installed in a small business and to reduce costs, the company decided to
install all consumer-grade wireless routers. The wireless routers will connect to a switch, which connects directly to the Internet connection providing 50
Mbps of Internet bandwidth that will be shared among 53 wireless clients and 17 wired clients. To ensure the wireless network is as secure as possible from
common attacks, what security measure can you implement given only the hardware referenced?