Question 6 of 119Given: One of the security risks introduced by WPA2-Personal is an attack conducted by an authorized network user who knows the passphrase. In order to decrypt other users traffic, the attacker must obtain certain information from the 4-way handshake of the other users. In addition to knowing the Pairwise Master Key (PMK) and the supplicants address (SA), what other three inputs must be collected with a protocol analyzer to recreate encryption keys? (Choose 3)
Correct Answer: A, B, C
Question 7 of 119What is a primary criteria for a network to qualify as a Robust Security Network (RSN)?
Correct Answer: C
Question 8 of 119Given: You are using a Wireless Aggregator utility to combine multiple packet captures. One capture exists for each of channels 1, 6 and 11. What kind of troubleshooting are you likely performing with such a tool?
Correct Answer: C
Question 9 of 119Which of the following security attacks cannot be detected by a WIPS solution of any kind? (Choose 2)
Correct Answer: C, D
Question 10 of 119Given: You have a Windows laptop computer with an integrated, dual-band, Wi-Fi compliant adapter. Your laptop computer has protocol analyzer software installed that is capable of capturing and decoding 802.11ac data. What statement best describes the likely ability to capture 802.11ac frames for security testing purposes?