PrepAway - Latest Free Exam Questions & Answers

Tag: wireless

How would Jeffrey access the wireless network?

Jeffery works at a large financial firm in Dallas, Texas as a securities analyst. Last week, the IT department of his company installed a wireless network throughout the building. The problem is, is that they are only going to make it available to upper management and the IT department.
Most employees don’t have a problem with this since they have no need for wireless networking, but Jeffery would really like to use wireless since he has a personal laptop that he works from as much as he can.
Jeffery asks the IT manager if he could be allowed to use the wireless network but he is turned down. Jeffery is not satisfied, so he brings his laptop in to work late one night and tries to get access to the network. Jeffery uses the wireless utility on his laptop, but cannot see any wireless networks available. fter about an hour of trying to figure it out, Jeffery cannot get on the company’s wireless network. Discouraged, Jeffery leaves the office and goes home.
The next day, Jeffery calls his friend who works with computers. His friend suggests that his IT department might have turned off SSID broadcasting, and that is why he could not see any wireless networks.
How would Jeffrey access the wireless network?

Why did the capturing of traffic take much less time on the wireless network?

Steven is a senior security analyst for a state agency in Tulsa, Oklahoma. His agency is currently undergoing a mandated security audit by an outside consulting firm. The consulting firm is halfway through the audit and is preparing to perform the actual penetration testing against the agency’s network. The firm first sets up a sniffer on the agency’s wired network to capture a reasonable amount of traffic to analyze later. This takes approximately 2 hours to obtain 10 GB of data. The consulting firm then sets up a sniffer on the agency’s wireless network to capture the same amount of traffic.This capture only takes about 30 minutes to get 10 GB of data.
Why did the capturing of traffic take much less time on the wireless network?

What do you think is the reason behind this?

In an attempt to secure his wireless network, Bob implements a VPN to cover the wireless communications he is using in his office. Soon after the implementation, users begin complaining about the wireless network slowing down. After benchmarking the network’s speed, Bob discovers that throughput has dropped by almost half, even though the number of users has remained the same. What do you think is the reason behind this?

What is Paul seeing here?

Paul has just finished setting up his wireless network.?He has enabled numerous security features such as changing the default SSID, enabling WPA encryption, and enabling MAC filtering on his wireless router. Paul notices that when he uses his wireless connection, the speed is sometimes 54 Mbps and sometimes it is only 24Mbps or less. Paul connects to his wireless router’s management utility and notices that a machine with an unfamiliar name is connected through his wireless connection. Paul checks the router’s logs and notices that the unfamiliar machine has the same MAC address as his laptop.
What is Paul seeing here?

What is this attack most appropriately called?

Matthew re-injects a captured wireless packet back onto the network. He does this hundreds of times within a second. The packet is correctly encrypted and Matthew assumes it is an ARP request packet. The wireless host responds with a stream of responses, all individually encrypted with different IVs. What is this attack most appropriately called?

Which of the following statements is true?

In an attempt to secure his 802.11b wireless network, Bob decides to use strategic antenna positioning. He places the antennas for the access points near the center of the building. For those access points near the outer edge of the building he uses semi-directional antennas that face towards the buildings center. There is a large parking lot and outlying field surrounding the building that extends out half a mile around the building. Bob figures that with this and his placement of antennas, his wireless network will be safe from attack. Which of the following statements is true?

What authentication mechanism is being followed here?

Jackson discovers that the wireless AP transmits 128 bytes of plaintext, and the station responds by encrypting the plaintext. It then transmits the resulting ciphertext using the same key and cipher that are used by WEP to encrypt subsequent network traffic. What authentication mechanism is being followed here?

Why would a scanner like Nessus is not recommended in this situation?

George is performing security analysis for Hammond and Sons LLC. He is testing security vulnerabilities of their wireless network. He plans on remaining as “stealthy” as possible during the scan. Why would a scanner like Nessus is not recommended in this situation?


Page 2 of 3123