In this configuration, the wireless network is initially susceptible to what type of attack?
You manage a wireless network that services 200 wireless users. Your facility requires 20 access points, and you have installed an IEEE 802.11-compliant implementation of 802.1X/LEAP with AES-CCMP as an authentication and encryption solution. In this configuration, the wireless network is initially susceptible to what type of attack?A . Offline...
What security solution is represented?
You perform a protocol capture using Wireshark and a compatible 802.11 adapter in Linux. When viewing the capture, you see an auth req frame and an auth rsp frame. Then you see an assoc req frame and an assoc rsp frame. Shortly after, you see DHCP communications and then ISAKMP...
When an RS-232 serial cable is connected between a service laptop and SC Series hardware, which parameters need to be selected?
When an RS-232 serial cable is connected between a service laptop and SC Series hardware, which parameters need to be selected?A . Baud Rate = 9600, Parity = None Data Bits = 8, Stop Bits =1, Flow Control = XON/XOFFB . Baud Rate = 115200, Parity = None Data Bits...
What statement best describes the likely ability to capture 802.11ac frames for security testing purposes?
You have a Windows laptop computer with an integrated, dual-band, Wi-Fi compliant adapter. Your laptop computer has protocol analyzer software installed that is capable of capturing and decoding 802.11ac data. What statement best describes the likely ability to capture 802.11ac frames for security testing purposes?A . Integrated 802.11ac adapters are...
Which one of the following would not be a suitable penetration testing action taken with this tool?
The Aircrack-ng WLAN software tool can capture and transmit modified 802.11 frames over the wireless network. It comes pre-installed on Kali Linux and some other Linux distributions. Which one of the following would not be a suitable penetration testing action taken with this tool?A . Auditing the configuration and functionality...
In order to acquire credentials of a valid user on a public hotspot network, what attacks may be conducted? Choose the single completely correct answer.
In order to acquire credentials of a valid user on a public hotspot network, what attacks may be conducted? Choose the single completely correct answer.A . MAC denial of service and/or physical theftB . Social engineering and/or eavesdroppingC . Authentication cracking and/or RF DoSD . Code injection and/or XSSE ....
Before creating the WLAN security policy, what should you ensure you possess?
ABC Hospital wishes to create a strong security policy as a first step in securing their 802.11 WLAN. Before creating the WLAN security policy, what should you ensure you possess?A . Management support for the process.B . Security policy generation software.C . End-user training manuals for the policies to be...
When writing the 802.11 security policy, what password-related items should be addressed?
As the primary security engineer for a large corporate network, you have been asked to author a new security policy for the wireless network. While most client devices support 802.1X authentication, some legacy devices still only support passphrase/PSK-based security methods. When writing the 802.11 security policy, what password-related items should...
What WLAN client device behavior is exploited by an attacker during a hijacking attack?
What WLAN client device behavior is exploited by an attacker during a hijacking attack?A . After the initial association and 4-way handshake, client stations and access points do not need to perform another 4-way handshake, even if connectivity is lost.B . Client drivers scan for and connect to access point...
What software and hardware tools are used in the process performed to hijack a wireless station from the authorized wireless network onto an unauthorized wireless network?
What software and hardware tools are used in the process performed to hijack a wireless station from the authorized wireless network onto an unauthorized wireless network?A . A low-gain patch antenna and terminal emulation softwareB . MAC spoofing software and MAC DoS softwareC . RF jamming device and a wireless...