Which of the following security attacks cannot be detected by a WIPS solution of any kind? (Choose 2)
You are using a Wireless Aggregator utility to combine multiple packet captures. One capture exists for each of channels 1, 6 and 11. What kind of troubleshooting
are you likely performing with such a tool?
What is a primary criteria for a network to qualify as a Robust Security Network (RSN)?
One of the security risks introduced by WPA2-Personal is an attack conducted by an authorized network user who knows the passphrase. In order to decrypt other
users’ traffic, the attacker must obtain certain information from the 4-way handshake of the other users. In addition to knowing the Pairwise Master Key (PMK) and
the supplicant’s address (SA), what other three inputs must be collected with a protocol analyzer to recreate encryption keys? (Choose 3)
WLAN attacks are typically conducted by hackers to exploit a specific vulnerability within a network. What statement correctly pairs the type of WLAN attack with the
exploited vulnerability? (Choose 3)
An attack is under way on the network. The attack is preventing users from accessing resources required for business operations, but the attacker has not gained
access to any files or data. What kind of attack is described?
A WLAN is implemented using WPA-Personal and MAC filtering. To what common wireless network attacks is this network potentially vulnerable? (Choose 3)
You are configuring seven APs to prevent common security attacks. The APs are to be installed in a small business and to reduce costs, the company decided to
install all consumer-grade wireless routers. The wireless routers will connect to a switch, which connects directly to the Internet connection providing 50
Mbps of Internet bandwidth that will be shared among 53 wireless clients and 17 wired clients. To ensure the wireless network is as secure as possible from
common attacks, what security measure can you implement given only the hardware referenced?
John Smith uses a coffee shop’s Internet hot-spot (no authentication or encryption) to transfer funds between his checking and savings accounts at his bank’s
website. The bank’s website uses the HTTPS protocol to protect sensitive account information. While John was using the hot-spot, a hacker was able to obtain
John’s bank account user ID and password and exploit this information. What likely scenario could have allowed the hacker to obtain John’s bank account user ID
What statement is true concerning the use of Orthogonal Frequency Division Multiplexing (OFDM) in IEEE