802.11b is considered a ____________ protocol.
802.11b is considered a ____________ protocol.
What would be the easiest way to circumvent and communicate on the WLAN?
While probing an organization you discover that they have a wireless network. From your attempts
to connect to the WLAN you determine that they have deployed MAC filtering by using ACL on the
access points. What would be the easiest way to circumvent and communicate on the WLAN?
Why is this considered to be a very limited security measure?
Access control is often implemented through the use of MAC address filtering on wireless Access
Points. Why is this considered to be a very limited security measure?
What kind of attack is this?
In order to attack a wireless network, you put up an access point and override the signal of the real
access point. As users send authentication data, you are able to capture it. What kind of attack is
this?
Why are SSID not considered to be a good security mechanism to protect a wireless networks?
On wireless networks, SSID is used to identify the network. Why are SSID not considered to be a
good security mechanism to protect a wireless networks?
What other steps does Bob have to take in order to successfully implement this?
Bob reads an article about how insecure wireless networks can be. He gets approval from his
management to implement a policy of not allowing any wireless devices on the network. What
other steps does Bob have to take in order to successfully implement this? (Select 2 answer.)
What authentication mechanism is being followed here?
Jackson discovers that the wireless AP transmits 128 bytes of plaintext, and the station responds
by encrypting the plaintext. It then transmits the resulting ciphertext using the same key and cipher
that are used by WEP to encrypt subsequent network traffic. What authentication mechanism is
being followed here?
Which tool would you recommend from the list below?
Jacob would like your advice on using a wireless hacking tool that can save him time and get him
better results with lesser packets. You would like to recommend a tool that uses KoreK’s
implementation. Which tool would you recommend from the list below?
What kind of attack is this?
In order to attack a wireless network, you put up an access point and override the signal of the real
access point. As users send authentication data, you are able to capture it. What kind of attack is
this?
What is this attack most appropriately called?
Matthew re-injects a captured wireless packet back onto the network. He does this hundreds of
times within a second. The packet is correctly encrypted and Matthew assumes it is an ARP
request packet. The wireless host responds with a stream of responses, all individually encrypted
with different IVs. What is this attack most appropriately called?