Skillsets
Certifications
Contact
Sign Up
Login
Home
Skillsets
Certifications
Contact
Help
FAQ
Network Attacks
SKILLSET
Network Attacks
Evading IDS
Denial of Service Attacks
Session Hijacking
Sniffing
IP Addressing and Routing Attacks
Web App Pen Testing
Wi-Fi Attacks
Related Questions
EAP supports IP connectivity and fragmentation. True or false?
What is an advantage of Kismet over other WiFi Network Detectors?
Unless a mobile device has its Bluetooth turned on and in Discovery mode the Bluesnarfing attack is not possible. True or false?
Which of the listed tools is a wardialing tool that uses voip providers over the internet ?
Which of the following EAP variants is supported in current versions of Windows? (Select all that apply.)
Airsnort is best used to crack WPA2 encryption.
One way to determine a hidden SSID is through a deauthentication attack. That attack kicks a user off of a wireless AP by sending a deauthentication packet and monitoring the SSID during the re-association request. That attack is only effective if a network is open or using WEP. If the AP is using WPA2 security, that attack won't be effective. True or false?
Which of these is NOT a wireless attack tool?
A WPA pre-shared key must be between 8 and 48 printable ASCII characters. True or false?
Which of the following is a layer 2 wireless network and device detector, sniffer, and wireless intrusion detection system?
×