Active Exploitation Flashcards
What device/devices does a de-authentication attack target?
- Client
- Access Point
- Both of the above
- None of the above
Both of the above
Which two of the following are goals an attacker might have when conducting a de-authentication attack?
- Forcing the target to flush it’s ARP cache and send an ARP request
- Causing the target to connect to an Access Point controlled by the attacker
WEP is inherently more secure than WPA due to it’s usage of a static key
False
What encryption standard was adopted by WPA/WPA2 as an improvement over the previous standard?
Actively gather initialization vectors (IVs)
What encryption standard was adopted by WPA/WPA2 as an improvement over the previous standard?
AES
TKIP ( Temporal Key Integrity Protocol) prevents replay attacks by implementing a sequence counter.
True
What encryption standard was adopted by WPA/WPA2 as an improvement over the previous standard?
AES
When using WPA-PSK, since the encryption strength is constant, password complexity provides no benefit.
False