Which tool would you recommend from the list below?
Jacob would like your advice on using a wireless hacking tool that can save him time and get him
better results with lesser packets. You would like to recommend a tool that uses KoreK’s
implementation. Which tool would you recommend from the list below?
What kind of attack is this?
In order to attack a wireless network, you put up an access point and override the signal of the real
access point. As users send authentication data, you are able to capture it. What kind of attack is
this?
What is this attack most appropriately called?
Matthew re-injects a captured wireless packet back onto the network. He does this hundreds of
times within a second. The packet is correctly encrypted and Matthew assumes it is an ARP
request packet. The wireless host responds with a stream of responses, all individually encrypted
with different IVs. What is this attack most appropriately called?
How can he generate traffic on the network so that he can capture enough packets to crack the WEP key?
Derek has stumbled upon a wireless network and wants to assess its security. However, he does
not find enough traffic for a good capture. He intends to use AirSnort on the captured traffic to
crack the WEP key and does not know the IP address range or the AP. How can he generate
traffic on the network so that he can capture enough packets to crack the WEP key?
you need to capture five to ten million packets in order to crack WEP with AirSnort?
Why do you need to capture five to ten million packets in order to crack WEP with AirSnort?
Which of these are true about WEP?
Sally is a network admin for a small company. She was asked to install wireless accesspoints in
the building. In looking at the specifications for the access-points, she sees that all of them offer
WEP. Which of these are true about WEP?
Select the best answer.
What is the recommended and well-known GPS mapping package that would interface with PrismStumbler?
Joe Hacker is going wardriving. He is going to use PrismStumbler and wants it to go to a GPS
mapping software application. What is the recommended and well-known GPS mapping package
that would interface with PrismStumbler?
Select the best answer.
Which of the following tools would allow you to detect unauthorized changes or modifications of binary files o
Virus Scrubbers and other malware detection program can only detect items that they are aware
of. Which of the following tools would allow you to detect unauthorized changes or modifications of
binary files on your system by unknown malware?
What are the main drawbacks for anti-virus software?
What are the main drawbacks for anti-virus software?
What is the best means of prevention against viruses?
What is the best means of prevention against viruses?