1/10
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Which of the following wireless security protocols is considered the weakest and most easily cracked?
WEP
What is the primary purpose of a wireless access point?
Connect wired networks to wireless devices
what is a MAC address filtering used for in wireless networks?
Restricting Device Access
What does SSID stand for?
Service Set Identifier
Why might an attacker perform a deauth attack?
Denial/ 4 way handshake
Which of the following are Wireless Network attacks? Choose all that apply,
Everything except SQL
Which of the following is a Rogue Access Point?
Wireless access points
Which of the following is an Evil Twin?
Fraudulent access point
What is the primary function of the Aircrack-ng tool suite?
Cracking WEP/WPA keys
Which type of attack involves intercepting communication between two parties to capture credentials?
Man in the middle
What is the role of a wireless sniffer?
Capture packets