Skillsets
Certifications
Contact
Sign Up
Login
Home
Skillsets
Certifications
Contact
Help
FAQ
Hacking Wireless Networks
SKILLSET
To penetrate or reconfigure WLANs in ways unintended by developers and designers.
Wi-Fi Attacks
Wi-Fi Security
Related Questions
Which of the following is not a function of router?
Which of the following encryption standards does WEP use for confidentiality?
An attacker captures some wireless network packets using Wireshark. He notices the following SSIDs: 'DigiLink', 'PublicWifi', and 'linksys'. Using this information, he creates access points with the same SSIDs to lure nearby devices to connect to his malicious devices. This attack is called ___ attack.
True or False: A router is a key component of any wireless LAN.
In WPA-PSK mode, an authentication server is used. True or false?
_____ frames are the most common type of wireless packets, at the rate of 10 times each second.
In a Linux OS, the STA are said to be in _______ mode
What type of antenna is used in wireless communication?
Which of the following factors can cause latency in a wireless network? (Select 2)
Which of the following encryptions works with WPA2-CCMP?
×