ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 290 - PT0-002 discussion

Report
Export

An organization wants to identify whether a less secure protocol is being utilized on a wireless network. Which of the following types of attacks will achieve this goal?

A.
Protocol negotiation
Answers
A.
Protocol negotiation
B.
Packet sniffing
Answers
B.
Packet sniffing
C.
Four-way handshake
Answers
C.
Four-way handshake
D.
Downgrade attack
Answers
D.
Downgrade attack
Suggested answer: D

Explanation:

A downgrade attack is a type of attack that exploits a vulnerability in the protocol negotiation process between a client and a server to force them to use a less secure protocol than they originally intended. A downgrade attack can be used to identify whether a less secure protocol is being utilized on a wireless network by intercepting and modifying the messages exchanged during the protocol negotiation phase, such as the association request and response frames, and making the client and the server agree on a weaker protocol, such as WEP or WPA, instead of a stronger one, such as WPA2 or WPA3. A downgrade attack can also enable the attacker to perform other attacks, such as cracking the encryption keys or capturing the network traffic, more easily by taking advantage of the weaknesses of the less secure protocol. A downgrade attack can be performed by using tools such as Airgeddon, which is a multi-use bash script for Linux systems to audit wireless networks1.

asked 02/10/2024
Devon Woods
37 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first