Question 6 of 119

A WLAN is implemented using WPA-Personal and MAC filtering.
To what common wireless network attacks is this network potentially vulnerable? (Choose 3)
Answer

Suggested Answer

The suggested answer is A, B, D.

Community Votes

No votes yet

Join the discussion to cast yours

Question 7 of 119

An attack is under way on the network. The attack is preventing users from accessing resources required for business operations, but the attacker has not gained access to any files or data. What kind of attack is described?
Answer

Suggested Answer

The suggested answer is D.

Community Votes

No votes yet

Join the discussion to cast yours

Question 8 of 119

Given: WLAN attacks are typically conducted by hackers to exploit a specific vulnerability within a network.
What statement correctly pairs the type of WLAN attack with the exploited vulnerability? (Choose 3)
Answer

Suggested Answer

The suggested answer is C, D, E.

Community Votes

No votes yet

Join the discussion to cast yours

Question 9 of 119

Given: One of the security risks introduced by WPA2-Personal is an attack conducted by an authorized network user who knows the passphrase. In order to decrypt other users traffic, the attacker must obtain certain information from the 4-way handshake of the other users.
In addition to knowing the Pairwise Master Key (PMK) and the supplicants address (SA), what other three inputs must be collected with a protocol analyzer to recreate encryption keys? (Choose 3)
Answer

Suggested Answer

The suggested answer is A, B, C.

Community Votes

No votes yet

Join the discussion to cast yours

Question 10 of 119

What is a primary criteria for a network to qualify as a Robust Security Network (RSN)?
Answer

Suggested Answer

The suggested answer is C.

Community Votes

No votes yet

Join the discussion to cast yours