Question 6 of 842
Adam has installed and configured his wireless network. He has enabled numerous security features such as changing the default SSID, enabling WPA encryption, and enabling MAC filtering on his wireless router. Adam notices that when he uses his wireless connection, the speed is sometimes 16 Mbps and sometimes it is only 8 Mbps or less. Adam connects to the management utility wireless router and finds out that a machine with an unfamiliar name is connected through his wireless connection. Paul checks the router's logs and notices that the unfamiliar machine has the same MAC address as his laptop.
Which of the following attacks has been occurred on the wireless network of Adam?
Correct Answer: C

Question 7 of 842
Which of the following is a technique of using a modem to automatically scan a list of telephone numbers, usually dialing every number in a local area code to search for computers, Bulletin board systems, and fax machines?
Correct Answer: D

Question 8 of 842
Network mapping provides a security testing team with a blueprint of the organization. Which of the following steps is NOT a part of manual network mapping?
Correct Answer: B

Network mapping involves identifying and documenting the devices and pathways in a network. This typically includes gathering private and public IP addresses, banner grabbing, and performing tracerouting to understand the network's structure and communication routes. Collecting employee information is not part of manual network mapping as it does not directly relate to the physical or logical layout of the network.

Question 9 of 842
Which of the following statements are true about tcp wrappers?
Each correct answer represents a complete solution. (Choose all that apply.)
Correct Answer: A, B, C

Question 10 of 842
Which of the following types of attacks is the result of vulnerabilities in a program due to poor programming techniques?
Correct Answer: D