Deck 1: Wireless Network Penetration Testing
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/10
Play
Full screen (f)
Deck 1: Wireless Network Penetration Testing
1
____ are devices used to access a wireless network.
A) Jammers
B) Access control lists
C) Wireless access points
D) Sniffers
A) Jammers
B) Access control lists
C) Wireless access points
D) Sniffers
Wireless access points
2
The primary purpose of ____ is to provide for confidentiality of data on wireless networks at a level equivalent to that of wired LANs.
A) Extensible Authentication Protocol
B) Wired Equivalent Privacy
C) Wi-Fi Protected Access 2
D) Wi-Fi Protected Access
A) Extensible Authentication Protocol
B) Wired Equivalent Privacy
C) Wi-Fi Protected Access 2
D) Wi-Fi Protected Access
Wired Equivalent Privacy
3
____ is a wireless hacking tool for auditing wireless networks.
A) Airodump
B) AirSnort
C) AiroPeek
D) Aircrack
A) Airodump
B) AirSnort
C) AiroPeek
D) Aircrack
Aircrack
4
____ hold a list of MAC addresses that are unique to a system and enable network transmission.
A) Access control lists
B) Security policies
C) Packets
D) Rogue access points
A) Access control lists
B) Security policies
C) Packets
D) Rogue access points
Unlock Deck
Unlock for access to all 10 flashcards in this deck.
Unlock Deck
k this deck
5
The term ____ is used to describe a computer network enumeration and footprinting technique (attack) that involves the spoofing of a network interface's unique MAC address.
A) eavesdropping
B) manipulation
C) MAC flooding
D) packet sniffing
A) eavesdropping
B) manipulation
C) MAC flooding
D) packet sniffing
Unlock Deck
Unlock for access to all 10 flashcards in this deck.
Unlock Deck
k this deck
6
____ are devices used to block wireless network communication within a specific area.
A) Sniffers
B) Jammers
C) Scanners
D) Adapters
A) Sniffers
B) Jammers
C) Scanners
D) Adapters
Unlock Deck
Unlock for access to all 10 flashcards in this deck.
Unlock Deck
k this deck
7
____ occurs when an attacker intercepts packets with encrypted data and changes the destination address to forward the packets to a different destination on the Internet.
A) Eavesdropping
B) Social networking
C) Channel hopping
D) Manipulation
A) Eavesdropping
B) Social networking
C) Channel hopping
D) Manipulation
Unlock Deck
Unlock for access to all 10 flashcards in this deck.
Unlock Deck
k this deck
8
____ is a tool that allows a user to decrypt a single packet without having the WEP key.
A) NetStumbler
B) Chopchop
C) WEPWedgie
D) KisMAC
A) NetStumbler
B) Chopchop
C) WEPWedgie
D) KisMAC
Unlock Deck
Unlock for access to all 10 flashcards in this deck.
Unlock Deck
k this deck
9
____ is a free stumbler application for Mac OS X that puts the computer's wireless card into monitor mode.
A) KisMAC
B) NetStumbler
C) Aircrack-ng
D) AirSnort
A) KisMAC
B) NetStumbler
C) Aircrack-ng
D) AirSnort
Unlock Deck
Unlock for access to all 10 flashcards in this deck.
Unlock Deck
k this deck
10
____ operates by passively monitoring transmissions and computing the encryption key when enough packets have been gathered.
A) KisMAC
B) NetStumbler
C) Aircrack-ng
D) AirSnort
A) KisMAC
B) NetStumbler
C) Aircrack-ng
D) AirSnort
Unlock Deck
Unlock for access to all 10 flashcards in this deck.
Unlock Deck
k this deck