PrepAway - Latest Free Exam Questions & Answers

Which of the following attacks is taking place?

A malicious user is sniffing a busy encrypted wireless network waiting for an authorized client to
connect to it. Only after an authorized client has connected and the hacker was able to capture the
client handshake with the AP can the hacker begin a brute force attack to discover the encryption
key. Which of the following attacks is taking place?

PrepAway - Latest Free Exam Questions & Answers

A.
IV attack

B.
WEP cracking

C.
WPA cracking

D.
Rogue AP

One Comment on “Which of the following attacks is taking place?

  1. Super_Mario says:

    One of those vaguely constructed questions.
    In here, the Hacker:
    • Is sniffing a busy encrypted wireless network
    • Waiting for an authorized client to connect to it
    • In an attempt to capture the client handshake
    • With the AP “Access Point”
    Process of elimination:
    A- IV Atack – An initialization vector (IV) attack is an attack on wireless networks. It modifies the IV of an encrypted wireless packet during transmission. Once an attacker learns the plaintext of one packet, the attacker can compute the RC4 key stream generated by the IV used.
    D- Rogue AP- There is no indication in here that the attacker is using a “Rogue Access Point” hence D is eliminated from the onset
    So the answer is a tossup between B and C.
    It could be either of them, as both WEP and WPA provide encryption .
    Having said that: WiFi Protected Access (WPA) is the most secure and is the replacement for WEP, so we shall assume in here that the company is using WPA as opposed to WEP
    Thus the only possible and reasonable answer is “C- WPA cracking”




    0



    0

Leave a Reply