Questions
As we conclude, here is a list of questions for you to test your knowledge regarding this chapter's material. You will find the answers in the Assessments section of the Appendix:
- Which of the following best describes a wireless hacking attack's evil twin?
- An attacker creates an access point for clients to connect to within a network range.
- Attackers create a system with the same MAC as a legitimate target.
- On a wireless network, an attacker sets up an authentication.
- An attacker logs in with the same username and password as a legitimate user.
- A WEP-encrypted access point has been located by a team. To crack WEP, what is required to perform a fake authentication to the AP? (Select two.)
- The access point's MAC address
- The SSID
- A replay of an authentication packet that was captured
- The wireless access point's IP address
- Which of the following statements about wireless security is correct?
- WPA2 is a superior encryption option to WEP.
- WEP is a superior...