PrepAway - Latest Free Exam Questions & Answers

Which of the following attacks is this an example of?

A security administrator is using a software program to test the security of a wireless access point. After running the program for a few hours, the access point
sends the wireless secret key back to the software program.
Which of the following attacks is this an example of?

PrepAway - Latest Free Exam Questions & Answers

A.
WPS

B.
IV

C.
Deauth

D.
Replay

Explanation:
Deauth attack sends disassocate packets to one or more clients which are currently associated with a particular access point. Disassociating clients
can be done for a number of reasons:
Recovering a hidden ESSID. This is an ESSID which is not being broadcast. Another term for this is “cloaked”.
Capturing WPA/WPA2 handshakes by forcing clients to reauthenticate Generate ARP requests (Windows clients sometimes flush their ARP cache when
disconnected)

4 Comments on “Which of the following attacks is this an example of?

  1. Bryan says:

    The initialization vector (IV) that WEP uses for encryption is 24-bit and IVs are reused with the same key. By examining the repeating result, it is easy for intruders to crack the WEP secret key, known as an IV attack.

    I would say that the correct is “B”.




    0



    0

Leave a Reply