Decoded: The Cybersecurity Podcast

Part 7 - CEH v12 Practice Questions: Wireless Attack Methods and Security Protocols


Listen Later

Part 7: Wireless Attacks (15 Questions)


1. Which wireless security protocol is considered the weakest and easiest to crack?

• A) WPA3

• B) WPA2

• C) WEP

• D) 802.1X


Answer: C) WEP


2. What attack captures wireless network packets to exploit encryption weaknesses?

• A) Rogue AP Attack

• B) Evil Twin Attack

• C) Packet Sniffing

• D) IV Attack


Answer: D) IV Attack


3. Which tool is commonly used to perform packet capturing on wireless networks?

• A) Metasploit

• B) Wireshark

• C) John the Ripper

• D) Nessus


Answer: B) Wireshark


4. An attacker creates a fake access point (AP) with the same SSID as a legitimate network. What type of attack is this?

• A) War driving

• B) Evil Twin Attack

• C) Rogue AP Attack

• D) Deauthentication Attack


Answer: B) Evil Twin Attack


5. Which of the following tools is commonly used to perform a deauthentication attack?

• A) Reaver

• B) Aircrack-ng

• C) Kismet

• D) NetStumbler


Answer: B) Aircrack-ng


6. What is the primary goal of a deauthentication attack?

• A) To intercept encrypted passwords

• B) To force clients off the network for denial of service

• C) To scan for open ports on a router

• D) To crack WPS PINs


Answer: B) To force clients off the network for denial of service


7. What is the primary risk of using public Wi-Fi networks?

• A) High latency

• B) IP address conflicts

• C) Packet interception and man-in-the-middle attacks

• D) Limited bandwidth


Answer: C) Packet interception and man-in-the-middle attacks


8. Which wireless security protocol offers the strongest encryption as of today?

• A) WPA3

• B) WPA2

• C) WEP

• D) TKIP


Answer: A) WPA3


9. Which wireless attack targets devices with WPS (Wi-Fi Protected Setup) enabled?

• A) IV Attack

• B) War driving

• C) Reaver Attack

• D) MAC Spoofing


Answer: C) Reaver Attack


10. What is the purpose of MAC address filtering in wireless networks?

• A) To encrypt wireless traffic

• B) To prevent unauthorized devices from connecting

• C) To improve bandwidth management

• D) To detect packet collisions


Answer: B) To prevent unauthorized devices from connecting


11. Which attack involves driving around to locate and exploit unsecured wireless networks?

• A) War driving

• B) War chalking

• C) Rogue AP Attack

• D) MITM Attack


Answer: A) War driving


12. What is the primary risk associated with rogue access points?

• A) Physical damage to network hardware

• B) Overloading network bandwidth

• C) Unauthorized network access and data interception

• D) IP address conflicts


Answer: C) Unauthorized network access and data interception


13. Which type of wireless attack relies on signal jamming to create network interference?

• A) Jamming Attack

• B) Rogue AP Attack

• C) Beacon Flood Attack

• D) Replay Attack


Answer: A) Jamming Attack


14. An attacker uses software to repeatedly broadcast fake SSID beacons, overwhelming available network options. What is this attack called?

• A) Rogue AP Attack

• B) Deauthentication Attack

• C) Beacon Flood Attack

• D) Packet Sniffing


Answer: C) Beacon Flood Attack


15. Which wireless penetration testing tool is known for conducting advanced wireless assessments, including packet sniffing, deauthentication attacks, and WPA cracking?

• A) Hydra

• B) Burp Suite

• C) Kismet

• D) Nmap


Answer: C) Kismet

...more
View all episodesView all episodes
Download on the App Store

Decoded: The Cybersecurity PodcastBy Edward Henriquez

  • 4.8
  • 4.8
  • 4.8
  • 4.8
  • 4.8

4.8

4 ratings


More shows like Decoded: The Cybersecurity Podcast

View all
Up First from NPR by NPR

Up First from NPR

56,391 Listeners

Darknet Diaries by Jack Rhysider

Darknet Diaries

8,010 Listeners

Cybersecurity Today by Jim Love

Cybersecurity Today

175 Listeners

Cyber Security Headlines by CISO Series

Cyber Security Headlines

134 Listeners

David Bombal by David Bombal

David Bombal

25 Listeners