Mod 6: Active 802 Exploitation - PE Flashcards

1
Q

What device/devices does a de-authentication attack target?

  • Access Point
  • Client
  • Both of the above
  • None of the above
A

Client

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which two of the following are goals an attacker might have when conducting a de-authentication attack?

  • Increasing latency between Access Point and client, degrading service
  • Forcing the target to flush it’s ARP cache and send an ARP request
  • Causing the target to connect to an Access Point controlled by the attacker
  • Capture the password being transmitted from the client to the Access Point
A

Forcing the target to flush it’s ARP cache and send an ARP request

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

[TRUE / FALSE]

WEP is inherently more secure than WPA due to it’s usage of a static key.

A

FALSE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the purpose of an ARP request replay attack?

  • Actively gather initialization vectors (IVs)
  • Overloading the Access Point in order to degrade service
  • Passively gather initialization vectors(IV’s)
  • Overload the Access Point in order to deny service
A

Actively gather initialization vectors (IVs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What encryption standard was adopted by WPA/WPA2 as an improvement over the previous standard?

  • DES
  • RSA
  • PGP
  • AES
A

AES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

[TRUE / FALSE]

WEP is inherently more secure than WPA due to it’s usage of a static key.

A

FALSE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

[TRUE / FALSE]

TKIP ( Temporal Key Integrity Protocol) prevents replay attacks by implementing a sequence counter.

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What encryption standard was adopted by WPA/WPA2 as an improvement over the previous standard?

  • DES
  • RSA
  • PGP
  • AES
A

AES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

[TRUE / FALSE]

When using WPA-PSK, since the encryption strength is constant, password complexity provides no benefit.

A

FALSE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly