Hacking Wireless Networks
SKILLSET
To penetrate or reconfigure WLANs in ways unintended by developers and designers.
Related Questions
- How does an AP in power-save mode know that an AP has more frames to send?
- The supplicant and authenticator both calculate the PTK (Pairwise Transient Key) during a WPA handshake. The length of this PTK is _____ bits.
- True or False: WPA was the resulting replacement for WEP due to WEP's weak encryption and poor vector handling.
- Which of the following is true regarding the shared key authentication process:
- In the case of 802.11 frames, the sequence number for each frame sent for a fragmented frame is:
- What wireless protocol is required to authenticate Active Directory or LDAP users for wireless access, and what service directly supports that authentication mechanism (Select 2)?
- Which of the following is an advantage of WiFi compared to a wired (Ethernet) connection?
- The 802.11 Wireless LAN does not operate at layer:
- Which of the following utilities send their information in clear text on a network?
- Of the three frames in data structure which one is the most vulnerable to data breaches. a) Management frames b) Control frames, or c) Data freames