Decoded: The Cybersecurity Podcast

Part 7 - CEH v12 Practice Questions: Wireless Attack Methods and Security Protocols


Listen Later

Part 7: Wireless Attacks (15 Questions)


1. Which wireless security protocol is considered the weakest and easiest to crack?

• A) WPA3

• B) WPA2

• C) WEP

• D) 802.1X


Answer: C) WEP


2. What attack captures wireless network packets to exploit encryption weaknesses?

• A) Rogue AP Attack

• B) Evil Twin Attack

• C) Packet Sniffing

• D) IV Attack


Answer: D) IV Attack


3. Which tool is commonly used to perform packet capturing on wireless networks?

• A) Metasploit

• B) Wireshark

• C) John the Ripper

• D) Nessus


Answer: B) Wireshark


4. An attacker creates a fake access point (AP) with the same SSID as a legitimate network. What type of attack is this?

• A) War driving

• B) Evil Twin Attack

• C) Rogue AP Attack

• D) Deauthentication Attack


Answer: B) Evil Twin Attack


5. Which of the following tools is commonly used to perform a deauthentication attack?

• A) Reaver

• B) Aircrack-ng

• C) Kismet

• D) NetStumbler


Answer: B) Aircrack-ng


6. What is the primary goal of a deauthentication attack?

• A) To intercept encrypted passwords

• B) To force clients off the network for denial of service

• C) To scan for open ports on a router

• D) To crack WPS PINs


Answer: B) To force clients off the network for denial of service


7. What is the primary risk of using public Wi-Fi networks?

• A) High latency

• B) IP address conflicts

• C) Packet interception and man-in-the-middle attacks

• D) Limited bandwidth


Answer: C) Packet interception and man-in-the-middle attacks


8. Which wireless security protocol offers the strongest encryption as of today?

• A) WPA3

• B) WPA2

• C) WEP

• D) TKIP


Answer: A) WPA3


9. Which wireless attack targets devices with WPS (Wi-Fi Protected Setup) enabled?

• A) IV Attack

• B) War driving

• C) Reaver Attack

• D) MAC Spoofing


Answer: C) Reaver Attack


10. What is the purpose of MAC address filtering in wireless networks?

• A) To encrypt wireless traffic

• B) To prevent unauthorized devices from connecting

• C) To improve bandwidth management

• D) To detect packet collisions


Answer: B) To prevent unauthorized devices from connecting


11. Which attack involves driving around to locate and exploit unsecured wireless networks?

• A) War driving

• B) War chalking

• C) Rogue AP Attack

• D) MITM Attack


Answer: A) War driving


12. What is the primary risk associated with rogue access points?

• A) Physical damage to network hardware

• B) Overloading network bandwidth

• C) Unauthorized network access and data interception

• D) IP address conflicts


Answer: C) Unauthorized network access and data interception


13. Which type of wireless attack relies on signal jamming to create network interference?

• A) Jamming Attack

• B) Rogue AP Attack

• C) Beacon Flood Attack

• D) Replay Attack


Answer: A) Jamming Attack


14. An attacker uses software to repeatedly broadcast fake SSID beacons, overwhelming available network options. What is this attack called?

• A) Rogue AP Attack

• B) Deauthentication Attack

• C) Beacon Flood Attack

• D) Packet Sniffing


Answer: C) Beacon Flood Attack


15. Which wireless penetration testing tool is known for conducting advanced wireless assessments, including packet sniffing, deauthentication attacks, and WPA cracking?

• A) Hydra

• B) Burp Suite

• C) Kismet

• D) Nmap


Answer: C) Kismet

...more
View all episodesView all episodes
Download on the App Store

Decoded: The Cybersecurity PodcastBy Edward Henriquez