CEH

(Jeff_L) #1

370 Chapter 15 ■ Wireless Networking



  1. When a wireless client is attached to an access point, it is known as which of the following?
    A. Infrastructure
    B. Client-server
    C. Peer-to-peer
    D. Ad hoc

  2. A is used to attack an NIDS.
    A. NULL session
    B. DoS
    C. Shellcode
    D. Port scan

  3. Which of the following uses a database of known attacks?
    A. Signature
    B. Anomaly
    C. Behavior
    D. Sniffer

  4. A honeyspot is designed to do what?
    A. Look for patterns of known attacks
    B. Look for deviations from known traffic patterns
    C. Attract victims to connect to it
    D. Analyze attacks patterns

  5. An SSID is used to do which of the following?
    A. Identify a network
    B. Identify clients
    C. Prioritize traffic
    D. Mask a network

  6. AirPcap is used to do which of the following?
    A. Assist in the sniffing of wireless traffic
    B. Allow for network traffic to be analyzed
    C. Allow for the identification of wireless networks
    D. Attack a victim

  7. What is a rogue access point?
    A. An access point not managed by a company
    B. An unmanaged access point
    C. A second access point
    D. A honeypot device

Free download pdf