ExamGecko
Question list
Search
Search

Related questions











Question 457 - 312-50v12 discussion

Report
Export

Attacker Rony installed a rogue access point within an organization's perimeter and attempted to intrude into its internal network. Johnson, a security auditor, identified some unusual traffic in the internal network that is aimed at cracking the authentication mechanism. He immediately turned off the targeted network and tested for any weak and outdated security mechanisms that are open to attack. What is the type of vulnerability assessment performed by johnson in the above scenario?

A.
Host-based assessment
Answers
A.
Host-based assessment
B.
Wireless network assessment
Answers
B.
Wireless network assessment
C.
Application assessment
Answers
C.
Application assessment
D.
Distributed assessment
Answers
D.
Distributed assessment
Suggested answer: B

Explanation:

Wireless network assessment determines the vulnerabilities in an organization's wireless networks.

In the past, wireless networks used weak and defective data encryption mechanisms. Now, wireless network standards have evolved, but many networks still use weak and outdated security mechanisms and are open to attack. Wireless network assessments try to attack wireless authentication mechanisms and gain unauthorized access. This type of assessment tests wireless networks and identifies rogue networks that may exist within an organization's perimeter. These assessments audit client-specified sites with a wireless network. They sniff wireless network traffic and try to crack encryption keys. Auditors test other network access if they gain access to the wireless network.

asked 18/09/2024
bryan calderon
33 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first