What will it return?
Look at the following SQL query.
SELECT * FROM product WHERE PCategory=’computers’ or 1=1–‘
What will it return? Select the best answer.
What do you think is the reason behind this?
Sandra is conducting a penetration test for XYZ.com. She knows that XYZ.com is using wireless
networking for some of the offices in the building right down the street. Through social engineering
she discovers that they are using 802.11g. Sandra knows that 802.11g uses the same 2.4GHz
frequency range as 802.11b. Using NetStumbler and her 802.11b wireless NIC, Sandra drives
over to the building to map the wireless networks. However, even though she repositions herself
around the building several times, Sandra is not able to detect a single AP.
What do you think is the reason behind this?
what was it designed for?
WEP is used on 802.11 networks, what was it designed for?
What is the most likely cause behind this?
RC4 is known to be a good stream generator. RC4 is used within the WEP standard on wireless
LAN. WEP is known to be insecure even if we are using a stream cipher that is known to be
secured.
What is the most likely cause behind this?
Why does this happen in the VPN over wireless implementation?
In an attempt to secure his wireless network, Bob implements a VPN to cover the wireless
communications. Immediately after the implementation, users begin complaining about how slow
the wireless network is. After benchmarking the network’s speed. Bob discovers that throughput
has dropped by almost half even though the number of users has remained the same.
Why does this happen in the VPN over wireless implementation?
Why do you think this is possible?
In an attempt to secure his wireless network, Bob turns off broadcasting of the SSID. He
concludes that since his access points require the client computer to have the proper SSID, it
would prevent others from connecting to the wireless network. Unfortunately unauthorized users
are still able to connect to the wireless network.
Why do you think this is possible?
Which of the following statements is true?
In an attempt to secure his 802.11b wireless network, Ulf decides to use a strategic antenna
positioning. He places the antenna for the access points near the center of the building. For those
access points near the outer edge of the building he uses semi-directional antennas that face
towards the building’s center. There is a large parking lot and outlying filed surrounding the
building that extends out half a mile around the building. Ulf figures that with this and his
placement of antennas, his wireless network will be safe from attack.
Which of the following statements is true?
Which of the following is NOT a reason 802.11 WEP encryption is vulnerable?
Which of the following is NOT a reason 802.11 WEP encryption is vulnerable?
Which of the following is true of the wireless Service Set ID (SSID)?
Which of the following is true of the wireless Service Set ID (SSID)? (Select all that apply.)
Which of the following wireless technologies can be detected by NetStumbler?
Which of the following wireless technologies can be detected by NetStumbler? (Select all that
apply)