Question 6 of 842

Adam has installed and configured his wireless network. He has enabled numerous security features such as changing the default SSID, enabling WPA encryption, and enabling MAC filtering on his wireless router. Adam notices that when he uses his wireless connection, the speed is sometimes 16 Mbps and sometimes it is only 8 Mbps or less. Adam connects to the management utility wireless router and finds out that a machine with an unfamiliar name is connected through his wireless connection. Paul checks the router's logs and notices that the unfamiliar machine has the same MAC address as his laptop.
Which of the following attacks has been occurred on the wireless network of Adam?
Answer

Suggested Answer

The suggested answer is C.

Community Votes

No votes yet

Join the discussion to cast yours

Question 7 of 842

Which of the following is a technique of using a modem to automatically scan a list of telephone numbers, usually dialing every number in a local area code to search for computers, Bulletin board systems, and fax machines?
Answer

Suggested Answer

The suggested answer is D.

Community Votes1 vote
DSuggested
100%
Question 8 of 842

Network mapping provides a security testing team with a blueprint of the organization. Which of the following steps is NOT a part of manual network mapping?
Answer

Suggested Answer

The suggested answer is B.

Network mapping involves identifying and documenting the devices and pathways in a network. This typically includes gathering private and public IP addresses, banner grabbing, and performing tracerouting to understand the network's structure and communication routes. Collecting employee information is not part of manual network mapping as it does not directly relate to the physical or logical layout of the network.

Community Votes4 votes
BSuggested
100%
Question 9 of 842

Which of the following statements are true about tcp wrappers?
Each correct answer represents a complete solution. (Choose all that apply.)
Answer

Suggested Answer

The suggested answer is A, B, C.

Community Votes1 vote
ABCSuggested
100%
Question 10 of 842

Which of the following types of attacks is the result of vulnerabilities in a program due to poor programming techniques?
Answer

Suggested Answer

The suggested answer is D.

Community Votes

No votes yet

Join the discussion to cast yours