Download Ec-council.Examsheets.312-50.v2014-02-04.by.Batista

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the work of artificial intelligence, which forms the content of this project

Transcript
QUESTION 777
Jackson discovers that the wireless AP transmits 128 bytes of plaintext, and the station responds by encrypting
the plaintext. It then transmits the resulting ciphertext using the same key and cipher that are used by WEP to
encrypt subsequent network traffic. What authentication mechanism is being followed here?
A.
B.
C.
D.
no authentication
single key authentication
shared key authentication
open system authentication
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation:
QUESTION 778
Jacob would like your advice on using a wireless hacking tool that can save him time and get him better results
with lesser packets. You would like to recommend a tool that uses KoreK's implementation. Which tool would
you recommend from the list below?
A.
B.
C.
D.
Kismet
Shmoo
Aircrack
John the Ripper
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation: Implementing KoreK's attacks as well as improved FMS,aircrack provides the fastest and most
effective statistical attacks available.John the Ripper is a password cracker,Kismet is an 802.11 layer2 wireless
network detector,sniffer,and intrusion detection system,and
QUESTION 779
In order to attack a wireless network, you put up an access point and override the signal of the real
access point. As users send authentication data, you are able to capture it. What kind of attack is this?
A.
B.
C.
D.
WEP attack
Drive by hacking
Rogue access point attack
Unauthorized access point attack
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Explanation: The definition of a Rogue access point is:
1. A wireless access point (AP) installed by an employee without the consent of the IT department. Without the
proper security configuration,users have exposed their company's network to the outside world.
2. An access point (AP) set up by an attacker outside a facility with a wireless network. Also called an "evil
twin," the rogue AP picks up beacons (signals that advertise its presence) from the company's legitimate AP
and transmits identical beacons,which some client machines inside the building associate with.
Document related concepts

Computer and network surveillance wikipedia, lookup

Computer security compromised by hardware failure wikipedia, lookup