PrepAway - Latest Free Exam Questions & Answers

Which of the following attacks on wireless LAN is performed to shut down the wireless network?

Which of the following attacks on wireless LAN is performed to shut down the wireless network?

PrepAway - Latest Free Exam Questions & Answers

A.
Active attack

B.
Man-in-the-middle attack

C.
Passive attack

D.
Jamming attack

Explanation:
A jamming attack can be a huge problem for wireless networks. Jamming is a technique that is used to simply shut down the wireless network. Jamming attacks are performed whenever a hacker uses passive and active attacks to access valuable information from the network.

Answer A is incorrect. An Active Attack is a type of Steganography attack in which the attacker changes the carrier during the communication process. It is also known as Disabling attack. A number of techniques are used in this attack, which are as follows. Blur This technique is used for smoothing the transition and controlling contrast on the hard edges, where there is significant color transition.
Noise Reduction This technique is used to reduce the noise by adjusting color and averaging pixel values. Noise is rectified by insertion of random or uniform pixels and colors, which resemble to the original pixels. Sharpen This technique is used to increase color contrast between adjacent pixels at the edges of objects. Rotate This technique is used to rotate an image in any direction around its centre point in a given space. Resample Soften This technique is a type of Blur with the difference that it applies a uniform blur to smooth edges and reduce contrast.

Answer C is incorrect. A passive attack is an attack in which an unauthorized attacker monitors the communication between two parties.

Answer B is incorrect. Man-in-the-middle attacks occur when an attacker successfully inserts an intermediary software or program between two communicating hosts.

The intermediary software or program allows attackers to listen to and modify the communication packets passing between the two hosts. The software intercepts the communication packets and then sends the information to the receiving host. The receiving host responds to the software, presuming it to be the legitimate client. Fact What is an attack? Hide An attack is an action against an information system or network that attempts to violate the system’s security policy. Attacks can be broadly classified as being either active or passive.
1. Active attacks modify the target system or message, i.e. they violate the integrity of the system or message.
2. Passive attacks violate confidentiality without affecting the state of the system. An example of such an attack is the electronic eavesdropping on network transmissions to release message contents or to gather unprotected passwords.


Leave a Reply