Which of these are true about WEP?
Sally is a network admin for a small company. She was asked to install wireless accesspoints in the building. In looking at the specifications for the access-points, she sees that all of them offer WEP. Which of these are true about WEP? Select the best answer.
Which of the following is NOT a reason 802.11 WEP encryption is vulnerable?
Which of the following is NOT a reason 802.11 WEP encryption is vulnerable?
WEP is used on 802.11 networks, what was it designed for?
WEP is used on 802.11 networks, what was it designed for?
What is Paul seeing here?
Paul has just finished setting up his wireless network.?He has enabled numerous security features such as changing the default SSID, enabling WPA encryption, and enabling MAC filtering on his wireless router. Paul notices that when he uses his wireless connection, the speed is sometimes 54 Mbps and sometimes it is only 24Mbps or less. Paul connects to his wireless router’s management utility and notices that a machine with an unfamiliar name is connected through his wireless connection. Paul checks the router’s logs and notices that the unfamiliar machine has the same MAC address as his laptop.
What is Paul seeing here?
Which of the following statements is true?
In an attempt to secure his 802.11b wireless network, Bob decides to use strategic antenna positioning. He places the antennas for the access points near the center of the building. For those access points near the outer edge of the building he uses semi-directional antennas that face towards the buildings center. There is a large parking lot and outlying field surrounding the building that extends out half a mile around the building. Bob figures that with this and his placement of antennas, his wireless network will be safe from attack. Which of the following statements is true?
What authentication mechanism is being followed here?
Jackson discovers that the wireless AP transmits 128 bytes of plaintext, and the station responds by encrypting the plaintext. It then transmits the resulting ciphertext using the same key and cipher that are used by WEP to encrypt subsequent network traffic. What authentication mechanism is being followed here?
Why do you need to capture five to ten million packets in order to crack WEP with AirSnort?
Why do you need to capture five to ten million packets in order to crack WEP with AirSnort?
How can he generate traffic on the network so that he can capture enough packets to crack the WEP key?
Derek has stumbled upon a wireless network and wants to assess its security. However, he does not find enough traffic for a good capture. He intends to use AirSnort on the captured traffic to crack the WEP key and does not know the IP address range or the AP. How can he generate traffic on the network so that he can capture enough packets to crack the WEP key?