Deck 1: Wireless Network Penetration Testing

Full screen (f)
exit full mode
Question
____ are devices used to access a wireless network.

A) Jammers
B) Access control lists
C) Wireless access points
D) Sniffers
Use Space or
up arrow
down arrow
to flip the card.
Question
The primary purpose of ____ is to provide for confidentiality of data on wireless networks at a level equivalent to that of wired LANs.

A) Extensible Authentication Protocol
B) Wired Equivalent Privacy
C) Wi-Fi Protected Access 2
D) Wi-Fi Protected Access
Question
____ is a wireless hacking tool for auditing wireless networks.

A) Airodump
B) AirSnort
C) AiroPeek
D) Aircrack
Question
____ hold a list of MAC addresses that are unique to a system and enable network transmission.

A) Access control lists
B) Security policies
C) Packets
D) Rogue access points
Question
The term ____ is used to describe a computer network enumeration and footprinting technique (attack) that involves the spoofing of a network interface's unique MAC address.

A) eavesdropping
B) manipulation
C) MAC flooding
D) packet sniffing
Question
____ are devices used to block wireless network communication within a specific area.

A) Sniffers
B) Jammers
C) Scanners
D) Adapters
Question
____ occurs when an attacker intercepts packets with encrypted data and changes the destination address to forward the packets to a different destination on the Internet.

A) Eavesdropping
B) Social networking
C) Channel hopping
D) Manipulation
Question
____ is a tool that allows a user to decrypt a single packet without having the WEP key.

A) NetStumbler
B) Chopchop
C) WEPWedgie
D) KisMAC
Question
____ is a free stumbler application for Mac OS X that puts the computer's wireless card into monitor mode.

A) KisMAC
B) NetStumbler
C) Aircrack-ng
D) AirSnort
Question
____ operates by passively monitoring transmissions and computing the encryption key when enough packets have been gathered.

A) KisMAC
B) NetStumbler
C) Aircrack-ng
D) AirSnort
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/10
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 1: Wireless Network Penetration Testing
1
____ are devices used to access a wireless network.

A) Jammers
B) Access control lists
C) Wireless access points
D) Sniffers
Wireless access points
2
The primary purpose of ____ is to provide for confidentiality of data on wireless networks at a level equivalent to that of wired LANs.

A) Extensible Authentication Protocol
B) Wired Equivalent Privacy
C) Wi-Fi Protected Access 2
D) Wi-Fi Protected Access
Wired Equivalent Privacy
3
____ is a wireless hacking tool for auditing wireless networks.

A) Airodump
B) AirSnort
C) AiroPeek
D) Aircrack
Aircrack
4
____ hold a list of MAC addresses that are unique to a system and enable network transmission.

A) Access control lists
B) Security policies
C) Packets
D) Rogue access points
Unlock Deck
Unlock for access to all 10 flashcards in this deck.
Unlock Deck
k this deck
5
The term ____ is used to describe a computer network enumeration and footprinting technique (attack) that involves the spoofing of a network interface's unique MAC address.

A) eavesdropping
B) manipulation
C) MAC flooding
D) packet sniffing
Unlock Deck
Unlock for access to all 10 flashcards in this deck.
Unlock Deck
k this deck
6
____ are devices used to block wireless network communication within a specific area.

A) Sniffers
B) Jammers
C) Scanners
D) Adapters
Unlock Deck
Unlock for access to all 10 flashcards in this deck.
Unlock Deck
k this deck
7
____ occurs when an attacker intercepts packets with encrypted data and changes the destination address to forward the packets to a different destination on the Internet.

A) Eavesdropping
B) Social networking
C) Channel hopping
D) Manipulation
Unlock Deck
Unlock for access to all 10 flashcards in this deck.
Unlock Deck
k this deck
8
____ is a tool that allows a user to decrypt a single packet without having the WEP key.

A) NetStumbler
B) Chopchop
C) WEPWedgie
D) KisMAC
Unlock Deck
Unlock for access to all 10 flashcards in this deck.
Unlock Deck
k this deck
9
____ is a free stumbler application for Mac OS X that puts the computer's wireless card into monitor mode.

A) KisMAC
B) NetStumbler
C) Aircrack-ng
D) AirSnort
Unlock Deck
Unlock for access to all 10 flashcards in this deck.
Unlock Deck
k this deck
10
____ operates by passively monitoring transmissions and computing the encryption key when enough packets have been gathered.

A) KisMAC
B) NetStumbler
C) Aircrack-ng
D) AirSnort
Unlock Deck
Unlock for access to all 10 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 10 flashcards in this deck.