In this configuration, the wireless network is initially susceptible to what type of attack?

You manage a wireless network that services 200 wireless users. Your facility requires 20 access points, and you have installed an IEEE 802.11-compliant implementation of 802.1X/LEAP with AES-CCMP as an authentication and encryption solution. In this configuration, the wireless network is initially susceptible to what type of attack?A . Offline...

December 27, 2019 No Comments READ MORE +

What security solution is represented?

You perform a protocol capture using Wireshark and a compatible 802.11 adapter in Linux. When viewing the capture, you see an auth req frame and an auth rsp frame. Then you see an assoc req frame and an assoc rsp frame. Shortly after, you see DHCP communications and then ISAKMP...

December 26, 2019 No Comments READ MORE +

When an RS-232 serial cable is connected between a service laptop and SC Series hardware, which parameters need to be selected?

When an RS-232 serial cable is connected between a service laptop and SC Series hardware, which parameters need to be selected?A . Baud Rate = 9600, Parity = None Data Bits = 8, Stop Bits =1, Flow Control = XON/XOFFB . Baud Rate = 115200, Parity = None Data Bits...

December 26, 2019 No Comments READ MORE +

What statement best describes the likely ability to capture 802.11ac frames for security testing purposes?

You have a Windows laptop computer with an integrated, dual-band, Wi-Fi compliant adapter. Your laptop computer has protocol analyzer software installed that is capable of capturing and decoding 802.11ac data. What statement best describes the likely ability to capture 802.11ac frames for security testing purposes?A . Integrated 802.11ac adapters are...

December 25, 2019 No Comments READ MORE +

Which one of the following would not be a suitable penetration testing action taken with this tool?

The Aircrack-ng WLAN software tool can capture and transmit modified 802.11 frames over the wireless network. It comes pre-installed on Kali Linux and some other Linux distributions. Which one of the following would not be a suitable penetration testing action taken with this tool?A . Auditing the configuration and functionality...

December 24, 2019 No Comments READ MORE +

In order to acquire credentials of a valid user on a public hotspot network, what attacks may be conducted? Choose the single completely correct answer.

In order to acquire credentials of a valid user on a public hotspot network, what attacks may be conducted? Choose the single completely correct answer.A . MAC denial of service and/or physical theftB . Social engineering and/or eavesdroppingC . Authentication cracking and/or RF DoSD . Code injection and/or XSSE ....

December 18, 2019 No Comments READ MORE +

Before creating the WLAN security policy, what should you ensure you possess?

ABC Hospital wishes to create a strong security policy as a first step in securing their 802.11 WLAN. Before creating the WLAN security policy, what should you ensure you possess?A . Management support for the process.B . Security policy generation software.C . End-user training manuals for the policies to be...

December 16, 2019 No Comments READ MORE +

When writing the 802.11 security policy, what password-related items should be addressed?

As the primary security engineer for a large corporate network, you have been asked to author a new security policy for the wireless network. While most client devices support 802.1X authentication, some legacy devices still only support passphrase/PSK-based security methods. When writing the 802.11 security policy, what password-related items should...

December 14, 2019 No Comments READ MORE +

What WLAN client device behavior is exploited by an attacker during a hijacking attack?

What WLAN client device behavior is exploited by an attacker during a hijacking attack?A . After the initial association and 4-way handshake, client stations and access points do not need to perform another 4-way handshake, even if connectivity is lost.B . Client drivers scan for and connect to access point...

December 13, 2019 No Comments READ MORE +

What software and hardware tools are used in the process performed to hijack a wireless station from the authorized wireless network onto an unauthorized wireless network?

What software and hardware tools are used in the process performed to hijack a wireless station from the authorized wireless network onto an unauthorized wireless network?A . A low-gain patch antenna and terminal emulation softwareB . MAC spoofing software and MAC DoS softwareC . RF jamming device and a wireless...

December 13, 2019 No Comments READ MORE +