Hacking Wireless Networks
SKILLSET
To penetrate or reconfigure WLANs in ways unintended by developers and designers.
Related Questions
- Which of these offers the highest speed?
- Basic WEP security protocol uses:
- By disabling SSID broadcast, we can implement basic wireless network security.
- Lori bought a new wireless router to use at her home. She configured the router, but her older laptop cannot connect to the router. Which wireless security protocols should Lori use in order to connect her laptop with the router?
- ___ field within the 802.11 frame that indicates that authentication and encryption are used in the frame.
- Which wireless authentication method uses encryption and keys are automatically changed and authenticated between devices after a specific interval of time?
- Wired Equivalent Privacy (WEP) used to give security by encrypting data on both sending and receiving devices. True or False?
- If an STA is in power-save mode, the traffic to it is buffered by the ______.
- The ______ factor tells Aircrack-ng how broadly to brute force key spaces (during WEP cracking using FMS attack).
- How many bits is WPA MIC code?