ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 10 - CWSP-207 discussion

Report
Export

Given: WLAN attacks are typically conducted by hackers to exploit a specific vulnerability within a network.

What statement correctly pairs the type of WLAN attack with the exploited vulnerability? (Choose 3)

A.
Management interface exploit attacks are attacks that use social engineering to gain credentials from managers.
Answers
A.
Management interface exploit attacks are attacks that use social engineering to gain credentials from managers.
B.
Zero-day attacks are always authentication or encryption cracking attacks.
Answers
B.
Zero-day attacks are always authentication or encryption cracking attacks.
C.
RF DoS attacks prevent successful wireless communication on a specific frequency or frequency range.
Answers
C.
RF DoS attacks prevent successful wireless communication on a specific frequency or frequency range.
D.
Hijacking attacks interrupt a user's legitimate connection and introduce a new connection with an evil twin AP.
Answers
D.
Hijacking attacks interrupt a user's legitimate connection and introduce a new connection with an evil twin AP.
E.
Social engineering attacks are performed to collect sensitive information from unsuspecting users
Answers
E.
Social engineering attacks are performed to collect sensitive information from unsuspecting users
F.
Association flood attacks are Layer 3 DoS attacks performed against authenticated client stations
Answers
F.
Association flood attacks are Layer 3 DoS attacks performed against authenticated client stations
Suggested answer: C, D, E
asked 16/09/2024
DAVID STAATZ
40 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first