PrepAway - Latest Free Exam Questions & Answers

Tag: wireless

Which of the following display filters will you enable in Ethereal to view the three-way handshake for…

Which of the following display filters will you enable in Ethereal to view the three-way handshake for a connection from host 192.168.0.1?

With this error checking, what will be the resulting speed of the wireless networks?

David is the wireless security administrator for Simpson Audio Visual. Davi d was hired on after the company was awarded a contract with 100 airports to install wireless networks. Since these networks will be used by both internal airport employees and visitors to the airports, David decided to go with the de facto standard of 802.11b. Every airport wants to use 802.11b with TCP error checking, even though David has said this will slow down the wireless network connection speeds. With this error checking, what will be the resulting speed of the wireless networks?

What do you think is the reason behind this?

Sandra is conducting a penetration test for pass4sure.com. She knows that pass4sure.com is using wireless networking for some of the offices in the building right down the street. Through social engineering she discovers that they are using 802.11g. Sandra knows that 802.11g uses the same 2.4GHz frequency range as 802.11b. Using NetStumbler and her 802.11b wireless NIC, Sandra drives over to the building to map the wireless networks. However, even though she repositions herself around the building several times, Sandra is not able to detect a single AP.
What do you think is the reason behind this?

What effective security solution will you recommend in this case?

You are the security administrator of Jaco Banking Systems located in Boston. You are setting up e-banking website (http://www.ejacobank.com) authentication system. Instead of issuing banking customer with a single password, you give them a printed list of 100 unique passwords. Each time the customer needs to log into the e-banking system website, the customer enters the next password on the list. If someone sees them type the password using shoulder surfing, MiTM or keyloggers, then no damage is done because the password will not be accepted a second time. Once the list of 100 passwords is almost finished, the system automatically sends out a new password list by encrypted e-mail to the customer.
You are confident that this security implementation will protect the customer from password abuse.
Two months later, a group of hackers called “HackJihad” found a way to access the one-time password list issued to customers of Jaco Banking Systems. The hackers set up a fake website (http://www.e-jacobank.com) and used phishing attacks to direct ignorant customers to it. The fake website asked users for their e-banking username and password, and the next unused entry from their one-time password sheet. The hackers collected 200 customer’s username/passwords this way. They transferred money from the customer’s bank account to various offshore accounts.
Your decision of password policy implementation has cost the bank with USD 925,000 to hackers. You immediately shut down the e-banking website while figuring out the next best security solution.
What effective security solution will you recommend in this case?

How can you achieve this?

You are the security administrator for a large network. You want to prevent attackers from running any sort of traceroute into your DMZ and discovering the internal structure of publicly accessible areas of the network. How can you achieve this?


Page 1 of 3123