Active Exploitation Flashcards

1
Q

What device/devices does a de-authentication attack target?

  • Client
  • Access Point
  • Both of the above
  • None of the above
A

Both of the above

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which two of the following are goals an attacker might have when conducting a de-authentication attack?

A
  1. Forcing the target to flush it’s ARP cache and send an ARP request
  2. Causing the target to connect to an Access Point controlled by the attacker
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

WEP is inherently more secure than WPA due to it’s usage of a static key

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What encryption standard was adopted by WPA/WPA2 as an improvement over the previous standard?

A

Actively gather initialization vectors (IVs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What encryption standard was adopted by WPA/WPA2 as an improvement over the previous standard?

A

AES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

TKIP ( Temporal Key Integrity Protocol) prevents replay attacks by implementing a sequence counter.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What encryption standard was adopted by WPA/WPA2 as an improvement over the previous standard?

A

AES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

When using WPA-PSK, since the encryption strength is constant, password complexity provides no benefit.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly