
Sign up to save your podcasts
Or
Part 7: Wireless Attacks (15 Questions)
1. Which wireless security protocol is considered the weakest and easiest to crack?
• A) WPA3
• B) WPA2
• C) WEP
• D) 802.1X
Answer: C) WEP
2. What attack captures wireless network packets to exploit encryption weaknesses?
• A) Rogue AP Attack
• B) Evil Twin Attack
• C) Packet Sniffing
• D) IV Attack
Answer: D) IV Attack
3. Which tool is commonly used to perform packet capturing on wireless networks?
• A) Metasploit
• B) Wireshark
• C) John the Ripper
• D) Nessus
Answer: B) Wireshark
4. An attacker creates a fake access point (AP) with the same SSID as a legitimate network. What type of attack is this?
• A) War driving
• B) Evil Twin Attack
• C) Rogue AP Attack
• D) Deauthentication Attack
Answer: B) Evil Twin Attack
5. Which of the following tools is commonly used to perform a deauthentication attack?
• A) Reaver
• B) Aircrack-ng
• C) Kismet
• D) NetStumbler
Answer: B) Aircrack-ng
6. What is the primary goal of a deauthentication attack?
• A) To intercept encrypted passwords
• B) To force clients off the network for denial of service
• C) To scan for open ports on a router
• D) To crack WPS PINs
Answer: B) To force clients off the network for denial of service
7. What is the primary risk of using public Wi-Fi networks?
• A) High latency
• B) IP address conflicts
• C) Packet interception and man-in-the-middle attacks
• D) Limited bandwidth
Answer: C) Packet interception and man-in-the-middle attacks
8. Which wireless security protocol offers the strongest encryption as of today?
• A) WPA3
• B) WPA2
• C) WEP
• D) TKIP
Answer: A) WPA3
9. Which wireless attack targets devices with WPS (Wi-Fi Protected Setup) enabled?
• A) IV Attack
• B) War driving
• C) Reaver Attack
• D) MAC Spoofing
Answer: C) Reaver Attack
10. What is the purpose of MAC address filtering in wireless networks?
• A) To encrypt wireless traffic
• B) To prevent unauthorized devices from connecting
• C) To improve bandwidth management
• D) To detect packet collisions
Answer: B) To prevent unauthorized devices from connecting
11. Which attack involves driving around to locate and exploit unsecured wireless networks?
• A) War driving
• B) War chalking
• C) Rogue AP Attack
• D) MITM Attack
Answer: A) War driving
12. What is the primary risk associated with rogue access points?
• A) Physical damage to network hardware
• B) Overloading network bandwidth
• C) Unauthorized network access and data interception
• D) IP address conflicts
Answer: C) Unauthorized network access and data interception
13. Which type of wireless attack relies on signal jamming to create network interference?
• A) Jamming Attack
• B) Rogue AP Attack
• C) Beacon Flood Attack
• D) Replay Attack
Answer: A) Jamming Attack
14. An attacker uses software to repeatedly broadcast fake SSID beacons, overwhelming available network options. What is this attack called?
• A) Rogue AP Attack
• B) Deauthentication Attack
• C) Beacon Flood Attack
• D) Packet Sniffing
Answer: C) Beacon Flood Attack
15. Which wireless penetration testing tool is known for conducting advanced wireless assessments, including packet sniffing, deauthentication attacks, and WPA cracking?
• A) Hydra
• B) Burp Suite
• C) Kismet
• D) Nmap
Answer: C) Kismet
Part 7: Wireless Attacks (15 Questions)
1. Which wireless security protocol is considered the weakest and easiest to crack?
• A) WPA3
• B) WPA2
• C) WEP
• D) 802.1X
Answer: C) WEP
2. What attack captures wireless network packets to exploit encryption weaknesses?
• A) Rogue AP Attack
• B) Evil Twin Attack
• C) Packet Sniffing
• D) IV Attack
Answer: D) IV Attack
3. Which tool is commonly used to perform packet capturing on wireless networks?
• A) Metasploit
• B) Wireshark
• C) John the Ripper
• D) Nessus
Answer: B) Wireshark
4. An attacker creates a fake access point (AP) with the same SSID as a legitimate network. What type of attack is this?
• A) War driving
• B) Evil Twin Attack
• C) Rogue AP Attack
• D) Deauthentication Attack
Answer: B) Evil Twin Attack
5. Which of the following tools is commonly used to perform a deauthentication attack?
• A) Reaver
• B) Aircrack-ng
• C) Kismet
• D) NetStumbler
Answer: B) Aircrack-ng
6. What is the primary goal of a deauthentication attack?
• A) To intercept encrypted passwords
• B) To force clients off the network for denial of service
• C) To scan for open ports on a router
• D) To crack WPS PINs
Answer: B) To force clients off the network for denial of service
7. What is the primary risk of using public Wi-Fi networks?
• A) High latency
• B) IP address conflicts
• C) Packet interception and man-in-the-middle attacks
• D) Limited bandwidth
Answer: C) Packet interception and man-in-the-middle attacks
8. Which wireless security protocol offers the strongest encryption as of today?
• A) WPA3
• B) WPA2
• C) WEP
• D) TKIP
Answer: A) WPA3
9. Which wireless attack targets devices with WPS (Wi-Fi Protected Setup) enabled?
• A) IV Attack
• B) War driving
• C) Reaver Attack
• D) MAC Spoofing
Answer: C) Reaver Attack
10. What is the purpose of MAC address filtering in wireless networks?
• A) To encrypt wireless traffic
• B) To prevent unauthorized devices from connecting
• C) To improve bandwidth management
• D) To detect packet collisions
Answer: B) To prevent unauthorized devices from connecting
11. Which attack involves driving around to locate and exploit unsecured wireless networks?
• A) War driving
• B) War chalking
• C) Rogue AP Attack
• D) MITM Attack
Answer: A) War driving
12. What is the primary risk associated with rogue access points?
• A) Physical damage to network hardware
• B) Overloading network bandwidth
• C) Unauthorized network access and data interception
• D) IP address conflicts
Answer: C) Unauthorized network access and data interception
13. Which type of wireless attack relies on signal jamming to create network interference?
• A) Jamming Attack
• B) Rogue AP Attack
• C) Beacon Flood Attack
• D) Replay Attack
Answer: A) Jamming Attack
14. An attacker uses software to repeatedly broadcast fake SSID beacons, overwhelming available network options. What is this attack called?
• A) Rogue AP Attack
• B) Deauthentication Attack
• C) Beacon Flood Attack
• D) Packet Sniffing
Answer: C) Beacon Flood Attack
15. Which wireless penetration testing tool is known for conducting advanced wireless assessments, including packet sniffing, deauthentication attacks, and WPA cracking?
• A) Hydra
• B) Burp Suite
• C) Kismet
• D) Nmap
Answer: C) Kismet