CWNP Exam Questions

attack occurs when a cracker is able to listen on network traffic and identify the MAC address of a

Fill in the blank with the appropriate term. attack occurs when a cracker is able to listen on network traffic and identify the MAC address of a computer with network privileges.

A.
MAC spoofing

Explanation:
MAC spoofing (or Identity theft) attack occurs when a cracker is able to listen on network traffic and identify the MAC address of a computer with network privileges. Most wireless systems allow some kind of MAC filtering to allow only the authorized computers with specific MAC IDs to gain access and utilize the network. However, a number of programs exist that have network “sniffing” capabilities.
Combine these programs with other software that allow a computer to pretend it has any MAC address that the cracker desires and can easily get around that hurdle. MAC Spoofing is a technique of changing an assigned Media Access Control (MAC) address of a networked device to a different one. The changing of the assigned MAC address may allow the bypassing of access control lists on the servers or routers, either hiding a computer on a network or allowing it, to impersonate another computer.