PrepAway - Latest Free Exam Questions & Answers

Which of the following is replayed during wireless authentication to exploit a weak key infrastructure?

Which of the following is replayed during wireless authentication to exploit a weak key
infrastructure?

PrepAway - Latest Free Exam Questions & Answers

A.
Preshared keys

B.
Ticket exchange

C.
Initialization vectors

D.
Certificate exchange

5 Comments on “Which of the following is replayed during wireless authentication to exploit a weak key infrastructure?

  1. Paul S says:

    Sorry but the answer is not ticket. Wireless exchanges do not send tickets. Ticket usage is normally tied to Kerberos. In this case, it appears to be picking on WEP. The answer is either initialization vectors or preshared keys. You can capture about 10000 IVs which will give you the preshared key. The issue is what is replayed and I would go with the IV over the preshared key. If I use the anticipated IV to tap into the wireless stream, that would allow me to tap into the wireless network without the key…. Again, a little iffy but I do feel like IV is best.




    0



    0
  2. Paul S says:

    I just got through an online explanation of the failings of WEP. The author explained that you collect a ton of IVs and then derive the key. The key is then replayed to get you into the network. I guess that I will shift to preshared keys.




    0



    0

Leave a Reply