ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 46 - PT0-002 discussion

Report
Export

A penetration tester has been contracted to review wireless security. The tester has deployed a malicious wireless AP that mimics the configuration of the target enterprise WiFi. The penetration tester now wants to try to force nearby wireless stations to connect to the malicious AP. Which of the following steps should the tester take NEXT?

A.
Send deauthentication frames to the stations.
Answers
A.
Send deauthentication frames to the stations.
B.
Perform jamming on all 2.4GHz and 5GHz channels.
Answers
B.
Perform jamming on all 2.4GHz and 5GHz channels.
C.
Set the malicious AP to broadcast within dynamic frequency selection channels.
Answers
C.
Set the malicious AP to broadcast within dynamic frequency selection channels.
D.
Modify the malicious AP configuration to not use a pre-shared key.
Answers
D.
Modify the malicious AP configuration to not use a pre-shared key.
Suggested answer: A

Explanation:

https://steemit.com/informatica/@jordiurbina1/tutorial-hacking-wi-fi-wireless-networks-withwifislax

The penetration tester should send deauthentication frames to the stations to force them to disconnect from their current access point and reconnect to another one, which may be the malicious AP deployed by the tester. Deauthentication frames are part of the 802.11 protocol and are used to terminate an existing wireless association between a station and an access point. However, they can also be spoofed by an attacker to disrupt or hijack wireless connections. The other options are not effective or relevant for this purpose. Performing jamming on all 2.4GHz and 5GHz channels would interfere with all wireless signals in the area, which may cause unwanted attention or legal issues. Setting the malicious AP to broadcast within dynamic frequency selection channels would not help, as these channels are used to avoid interference with radar systems and are not commonly used by wireless stations or access points. Modifying the malicious AP configuration to not use a preshared key would not help, as it would make it less likely for wireless stations to connect to it if they are configured to use encryption.

asked 02/10/2024
max artusa
39 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first