Exam 1: Wireless Network Penetration Testing
Exam 1: Wireless Network Penetration Testing10 Questions
Exam 2: Advanced Wireless Testing10 Questions
Exam 3: VoIP Penetration Testing10 Questions
Exam 4: VPN Penetration Testing10 Questions
Exam 5: Wardialing10 Questions
Exam 6: Bluetooth and Handheld Device Penetration Testing10 Questions
Exam 7: Telecommunication and Broadband Communication Penetration Testing10 Questions
Exam 8: Communication Media14 Questions
Select questions type
____ hold a list of MAC addresses that are unique to a system and enable network transmission.
Free
(Multiple Choice)
4.9/5
(37)
Correct Answer:
A
The primary purpose of ____ is to provide for confidentiality of data on wireless networks at a level equivalent to that of wired LANs.
Free
(Multiple Choice)
4.8/5
(48)
Correct Answer:
B
____ is a tool that allows a user to decrypt a single packet without having the WEP key.
Free
(Multiple Choice)
4.8/5
(31)
Correct Answer:
B
____ operates by passively monitoring transmissions and computing the encryption key when enough packets have been gathered.
(Multiple Choice)
4.9/5
(35)
____ are devices used to block wireless network communication within a specific area.
(Multiple Choice)
5.0/5
(31)
____ occurs when an attacker intercepts packets with encrypted data and changes the destination address to forward the packets to a different destination on the Internet.
(Multiple Choice)
4.9/5
(27)
The term ____ is used to describe a computer network enumeration and footprinting technique (attack) that involves the spoofing of a network interface's unique MAC address.
(Multiple Choice)
5.0/5
(32)
____ is a wireless hacking tool for auditing wireless networks.
(Multiple Choice)
4.8/5
(33)
____ is a free stumbler application for Mac OS X that puts the computer's wireless card into monitor mode.
(Multiple Choice)
4.8/5
(35)
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)