Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

ITN - 261 CHAPTER 11 QUESTIONS & ANSWERS 100% CORRECT

Beoordeling
-
Verkocht
-
Pagina's
6
Cijfer
A+
Geüpload op
30-06-2025
Geschreven in
2024/2025

What are the two types of wireless networks? 1. Star and ring 2. Bus and hybrid 3. Infrastructure and hybrid 4. Infrastructure and ad hoc - ANSWER4. Infrastructure and ad hoc An infrastructure wireless network is one that uses an access point. An ad hoc wireless network is one organized by the participants. These are the two types of wireless networks. Star, ring, bus, and hybrid are all wired topologies. How many stages are used in the WPA handshake? 1. Two 2. Four 3. Three 4. One - ANSWER2. Four There are four stages used in a WPA handshake. This four-stage process is used to derive the key and agree on capabilities. While there are Bluetooth devices that will transmit much further, a common range is about 300 feet (100 meters) for Bluetooth 4.0.

Meer zien Lees minder
Instelling
ITN - 261 CHAPTER 11
Vak
ITN - 261 CHAPTER 11

Voorbeeld van de inhoud

ITN - 261 CHAPTER 11 QUESTIONS &
ANSWERS 100% CORRECT


What are the two types of wireless networks?

1. Star and ring
2. Bus and hybrid
3. Infrastructure and hybrid
4. Infrastructure and ad hoc - ANSWER4. Infrastructure and ad hoc

An infrastructure wireless network is one that uses an access point. An ad hoc wireless
network is one organized by the participants. These are the two types of wireless
networks. Star, ring, bus, and hybrid are all wired topologies.

How many stages are used in the WPA handshake?

1. Two
2. Four
3. Three
4. One - ANSWER2. Four

There are four stages used in a WPA handshake. This four-stage process is used to
derive the key and agree on capabilities.

While there are Bluetooth devices that will transmit much further, a common range is
about 300 feet (100 meters) for Bluetooth 4.0.

What tool could you use to enable sniffing on your wireless network to acquire all
headers?

1. Ettercap
2. Tcpdump
3. Aircrack-ng
4. Airmon-ng - ANSWER4. Airmon-ng (Air Monitoring - Next Generation)

Tcpdump can be used to capture frames/packets. Ettercap is used for captures and
spoofing attacks. Neither can capture all headers, including radio headers in a wireless
network. The package aircrack-ng includes the program airmon-ng, which can turn on
monitor mode on a network interface. The program aircrack-ng itself cannot do that.

, What mode has to be enabled on a network interface to allow all headers in wireless
traffic to be captured?

1. Promiscuous
2. Monitor
3. Radio
4. Wireless LAN - ANSWER2. Monitor

Promiscuous mode is used on network interfaces to collect frames that are not destined
for the network interface. This is insufficient on a wireless network because the radio
headers are not captured. To capture radio headers, monitor mode needs to be enabled
in addition to the promiscuous mode that will always be set to get all frames and all
information from the frame. Only monitor mode gives the radio headers.

What wireless attack would you use to take a known piece of information in order to be
able to decrypt wireless traffic?

1. Sniffing
2. Deauthentication
3. Key reinstallation
4. Evil twin - ANSWER3. Key reinstallation

Sniffing can be used to collect information that may be needed to launch wireless
attacks. A deauthentication attack can be used to force a station to generate traffic. An
evil twin attack uses a rogue access point to pretend to be a legitimate network. In order
to decrypt network traffic, you would need the key. One way to get the key is to reuse
information from network traffic that generated a known key. This is a key reinstallation
attack.

What is the purpose of performing a Bluetooth scan?

1. Identifying open ports
2. Identifying available profiles
3. Identifying endpoints
4. Identifying vendors - ANSWER3. Identifying endpoints

Bluetooth doesn't use ports. While profiles are important, you get the profile capabilities
during the pairing process. Just performing a scan won't get you a list of supported
profiles. While you should be able to identify vendors as part of the process of running a
Bluetooth scan, it's not the purpose of the scan. The purpose is to identify endpoints
and their associated addresses so you can run other attacks on them.

What is the purpose of a deauthentication attack?

1. Disabling stations
2. Forcing stations to reauthenticate

Geschreven voor

Instelling
ITN - 261 CHAPTER 11
Vak
ITN - 261 CHAPTER 11

Documentinformatie

Geüpload op
30 juni 2025
Aantal pagina's
6
Geschreven in
2024/2025
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

$14.99
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
nursingismylife West Virginia University
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
260
Lid sinds
3 jaar
Aantal volgers
174
Documenten
9125
Laatst verkocht
4 dagen geleden

3.6

38 beoordelingen

5
14
4
12
3
3
2
1
1
8

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen