CompTIA Pentest+ Chapter 8 Questions Flashcards

1
Q

WEP uses an encryption algorithm called RC4; which was developed by Ronald Rivest.

RC4 is a \_\_\_\_ cipher, which is symmetric key cipher used to expand a short key into an infinite pseudo-random keystream.
A.Keystream
B.Asymmetric
C.Block
D.Secret
A

C.Block

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

CRC-32 is an algorithm used to verify the integrity of network packets for WEP and is also found indifferent applications to detect changes in hardware.

CRC-32 is based on the original cycle redundancy check and is not recommended for verifying the integrity of modern-day technology due to the fact that ______ (Select the best answer)
A.It is an older form of integrity checking software that has multiple vulnerabiltiies
B.CRC-32 is a variant of CRC, which is based on non cryptographic algorithm that offers very little assurance with regard to data manipulation
C.CRC is a variant of CRC-32, which is based on a cryptographic algorithm that offers very little assurance with regard to data manipulation
D. It is an older form of integrity checking software that has few to no vulnerabilities

A

B.CRC-32 is a variant of CRC, which is based on non cryptographic algorithm that offers very little assurance with regard to data manipulation

Explanation:
CRC-32 is a noncryptographic algorithm based off of CRC (cyclic redundancy check).
Since the algorithm is based on code generation and cryptography, it provides little value with regard to integrity, as this value can easily be reproduced

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

In order to crack WEP, you need to capture enough initialization vectors (IV) in the network packets to recover the secret key.

WEP secret keys can be one of two different lengths.

10-digit keys are 64 bits in lengths.

How many digits are in a key length of 128-bits?
A.24
B.16
C.26
D.28
A

C.26

Explanation:
A WEP key of 64 bits in length is 10 digits and a 128-bit key length is 26 digits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

With WPA, the wireless client and the access point both know the pre-shared key in order to join the network.

During the authorization process, each device will use the PSK to generate a pairwise master key (PMK) in order to derive a _____ which is used to encrypt packets sent to receiving host.

What is this type of key called?
A.Pre-shared key
B.Pairwise share key
C.Pairwise transfer key
D.Pairwise transient key
A

D.Pairwise transient key

Explanation:
The PMK is never exposed over the network; instead the pairwise transient key (PTK) is derived from the PMK and used to encrypt network communication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

During a pentest, your team identifies an access point that is broadcasting the SSID value and is protected with only WEP encryption.

Your team attempts to use aireplay-ng to replay an injected ARP packet over the network; however, the tool has not captured any ARP replies over the network.

This is likely due to the fact that there are no clients talking over the network.

In order to speed up the cracking process, what could you recommend your team to do?
A.Use a MiTM tool in order to attack clients actively listening on the network
B.Use the ping command and ping nonexistent hosts on the network
C.Try and telnet or remotely log in to other hosts over the network
D.Navigate to web pages in your browser in order to generate some network traffic

A

B.Use the ping command and ping nonexistent hosts on the network

Explanation:
The use of ping against nonexistent hosts repeatedly will generate multiple IVs with the AP as the host, but will never be identified, and the request will continue to propagate throughout the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
PBKDF2 is used to calculate the PMK using the following values, except for which one?
A.The password/passphrase (PSK)
B.The access point SSID or ESSID
C.The length of the SSID or ESSID
D.The host name of the device
A

D.The hostname of the ddevice

Explanation:
The PMK is derived from all of the options, with the exception of the device host name.

The missing values are 256 (length of the PMK) and 4096 (number of hashing iterations)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

In order to crack the WPA or WPA2 PSK you will need to capture the four-way handshake.

During a pentest, your team identifies multiple clients on the target network.

What is the best way to capture the handshake?
A.Deauthenticate one of the clients
B.Send multiple ARP requests over the network
C.Deauthenticate all the clients on the network
D.Send multiple ARP requests to the access point

A

A.Deauthenticate one of the clients

Explanation:
Deauthentication tells the client to disassociate from the wireless network

Deauthenticating one client at a time until you capture the handshake would be the recommended choice of action, as it helps to remain quiet in your approach and would be the method that would cause the least amount of resistance from customers during an engagement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The evil twin access point is a type of attack used to duplicate the existence of a legitimate access point in order to entice victims to connect for the purpose of targeting end-user devices or communications.

Another way to imitate all possible access points from client beacons requests is called what?
A.Karma attack
B.Replay attack
C.AP relay attack
D.Social engineering attack
A

A.Karma Attack

Explanation:
The Karma attack will target any SSID it discovers in order to increase the likelihood for exploitation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
This command can be used to execute a type of "ping of death" against Bluetooth devices.
A.L2PP
B.L2TP
C.L2PING
D.LPING
A

C.L2PING

Explanation:
L2PING provides a method that can be used to identify Bluetooth devices, as well as target them for DoS attacks, using the target MAC address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
All of the following are layers in the Bluetooth protocol stack except for which one?
A.LMP
B.SDP
C.L2CAP
D.TC2
E.RCOMM
A

D.TC2

Explanation:
TC2 is not a valid layer of Bluetooth protocol stack.

TCS is however, a valid layer in the protocol stack and is used for controlling telephone functions on the mobile device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly