CompTIA Pentest+ Chapter 3 Questions Flashcards
The Institute of Electrical and Electronics Engineers (IEEE) standards association devel-ops communication standards for different industries.
Which standard applies to wire-less networking (Wi-Fi) A.802.12 B.802.3 C.802.11 D.802.15
C.802.11
Explanation:
The IEEE standards provides implementation specifications for wireless networks
Wi-Fi networks operate on specific wireless frequency bands in the wireless spectrum
Which wireless frequency bands support Wi-Fi networks? (Select all that apply)
A,2.4GHz
D.5GHz
Explanation:
Wi-Fi networks operate within the 2.4 and 5 GHz bands
How many wireless channels are available on the 2.4GHz band within the United States? A.12 B.14 C.11 D.10
C.11
Explanation:
Each country has its own specifications on supported wireless channels.
A total of 14 channels in the 2.4GHz band are supported around the world.
However, only 1 to 11 are supported in the US
A suite of tools that provide capabilities for conducting RF communication monitoring and wireless network security auditing is called? A.airman-ng B.aircrack-ng C.airmon-ng D.airmmm-ng
B.aircrack-ng
Explanation:
Aircrack-ng provides a suite of tools that can be sued for monitoring and attacking Wi-Fi networks
Before using airmon-ng which mode should the wireless adapter be configured in? A.management mode B.Monitor mode C.Injection mode D.Cracking mode
B.Monitor mode
Explanation:
The wireless adapter needs to be placed into monitor mode before capturing and injecting packets on the network.
In Kali, this can be accomplished by using airmon-ng start
IEEE defines three wireless frames within the wireless standard for Wi-Fi network devices.
Which frame is ultimately used for authentication? A.Management frame B.Control frame C.Monitor frame D.Data frame
A.Management frame
Explanation:
Management frames enable stations or clients to maintain communication with the AP and include multiple subtypes, including authentication
In wireless networks, which frame is a type of management frame that identifies the SSID encryption type, and MAC address of an access point? A.Beacon frame B.Probe request frame C.Data frame D.Association response frame
A.Beacon frame
Explanation:
The beacon frame includes the important connection and association information with the other stations/clients from the AP
Which port scan method is also known as a half-open scan that never established a true connection the with target host over the network? A.TCP scan B.UDP Scan C.SYN ACK D.SYN scan
D.SYN scan
Explanation:
The TCP SYN scan is also known as the half-open scan, as it never completes the three-way handshake
When conducting a port scan against a target, which nmap flag is used to speiocfy a port range? A.--p B,-p C.-Pn D.-ports
B,-p
Explanation:
The -p flag option in nmap will specify the port range.
On the other hand, using -p- will intiate a full port scan, targeting all possible ports (65,535) that could be open
Which nmap script could you use to enumerate popular web directories from the service hosted on port 80? A.http-grep B.http-enum C.web-enum D.http-ntlm
B.http-enum
Explanation:
The http-enum script is an NSE included with the installation of nmap.
This script will enumerate web folders commonly found within typical web application services