Given: Many computer users connect to the Internet at airports, which often have 802.11n access points with a captive portal for authentication.While using an airport hot-spot with this security solution, to what type of wireless attack is a user susceptible? (Choose 2)
Given: During 802.1X/LEAP authentication, the username is passed across the wireless medium in clear text.From a security perspective, why is this significant?
Given: In XYZs small business, two autonomous 802.11ac APs and 12 client devices are in use with WPA2-Personal.What statement about the WLAN security of this company is true?
Given: The Aircrack-ng WLAN software tool can capture and transmit modified 802.11 frames over the wireless network. It comes pre-installed on Kali Linux and some other Linux distributions.What are three uses for such a tool? (Choose 3)
Given: You manage a wireless network that services 200 wireless users. Your facility requires 20 access points, and you have installed an IEEE 802.11-compliant implementation of 802.1X/LEAP with AES-CCMP as an authentication and encryption solution.In this configuration, the wireless network is initially susceptible to what type of attacks? (Choose 2)
Given: John Smith uses a coffee shop's Internet hot-spot (no authentication or encryption) to transfer funds between his checking and savings accounts at his bank's website. The banks website uses the HTTPS protocol to protect sensitive account information. While John was using the hot-spot, a hacker was able to obtain Johns bank account user ID and password and exploit this information.What likely scenario could have allowed the hacker to obtain Johns bank account user ID and password?