PrepAway - Latest Free Exam Questions & Answers

Author: seenagape

What is this attack most appropriately called?

Matthew re-injects a captured wireless packet back onto the network. He does this hundreds of
times within a second. The packet is correctly encrypted and Matthew assumes it is an ARP
request packet. The wireless host responds with a stream of responses, all individually encrypted
with different IVs. What is this attack most appropriately called?

How can he generate traffic on the network so that he can capture enough packets to crack the WEP key?

Derek has stumbled upon a wireless network and wants to assess its security. However, he does
not find enough traffic for a good capture. He intends to use AirSnort on the captured traffic to
crack the WEP key and does not know the IP address range or the AP. How can he generate
traffic on the network so that he can capture enough packets to crack the WEP key?


Page 186 of 555« First...102030...184185186187188...200210220...Last »