Exam 1: Wireless Network Penetration Testing

arrow
  • Select Tags
search iconSearch Question
  • Select Tags

____ hold a list of MAC addresses that are unique to a system and enable network transmission.

Free
(Multiple Choice)
4.9/5
(37)
Correct Answer:
Verified

A

The primary purpose of ____ is to provide for confidentiality of data on wireless networks at a level equivalent to that of wired LANs.

Free
(Multiple Choice)
4.8/5
(48)
Correct Answer:
Verified

B

____ is a tool that allows a user to decrypt a single packet without having the WEP key.

Free
(Multiple Choice)
4.8/5
(31)
Correct Answer:
Verified

B

____ are devices used to access a wireless network.

(Multiple Choice)
4.7/5
(38)

____ operates by passively monitoring transmissions and computing the encryption key when enough packets have been gathered.

(Multiple Choice)
4.9/5
(35)

____ are devices used to block wireless network communication within a specific area.

(Multiple Choice)
5.0/5
(31)

____ occurs when an attacker intercepts packets with encrypted data and changes the destination address to forward the packets to a different destination on the Internet.

(Multiple Choice)
4.9/5
(27)

The term ____ is used to describe a computer network enumeration and footprinting technique (attack) that involves the spoofing of a network interface's unique MAC address.

(Multiple Choice)
5.0/5
(32)

____ is a wireless hacking tool for auditing wireless networks.

(Multiple Choice)
4.8/5
(33)

____ is a free stumbler application for Mac OS X that puts the computer's wireless card into monitor mode.

(Multiple Choice)
4.8/5
(35)
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)