Normal No Spac.. Heading 1 Heading 2 Title Paragraph Styles 1-A company hires yo
ID: 3710098 • Letter: N
Question
Normal No Spac.. Heading 1 Heading 2 Title Paragraph Styles 1-A company hires you as part of their security team. They are implementing new policies and procedures regarding mobile devices in the network Which of the following would not be a recommended practice? 2- Which of the following tools would be used in a blackjacking attack? 3- Which of the following tools is a vulnerability scanner for Android devices? type of jailbreaking allows user-level access but does not allow iBoot-level access? 5-While on vacation, Joe receives a phone call from his identity alert service notifying him that two of his accounts have been accessed in the past hour Earlier in the day, he did connect a laptop to a wireless hotspot at McDonald's and accessed the two accounts in question. Which of the following is the most likely attack used against Joe? 6- An attacker is attempting to crack a WEP code to gain access to the network. After enabling monitor mode on wlan0 and creating a monitoring interface (mon 0), she types this command: atteplay-ng-0 0-a 0A:00.2B:40:70:80-c mono. what is she trying to accomplish? 7- Which wireless standard works at 54 Mbps on a frequency range of 2.4 GHz? 8-You have discovered an access point using WEP for encryption purposes. Which of the following is the best choice for uncovering the network key? 9- A pen test member is running the Airsnarf tool from a Linux laptop. What is she attempting? 10-What frequency does Bluetooth operate in? 11- What is the integrity check mechanism for WPA2(Ctr) #@ew @e@Explanation / Answer
Answers :
1. It is good to implement the new policies and proecedures related to mobile devices, but if employees dont understand its importance then it is of no use. To avoid this , human behaviour should not be critical and there should not be any misunderstood component that trying to attack sensitive company resources. This would not be an recommended practice.
2. BBProxy tool is used in Blackjacking attack. It is one of the most popular hacking tool that is vulnerable for a attack.
3. WPScan and Nessus tool are used as a vulnerability scanner for Android devices. Both are used to detect malware and vulnerable threats.
4. Userland exploit is the type of jailbreaking that only allows user-level access.
5. Sniffer attack will be happened against Joe.As this is the most basic kind of attack and can eavedrop on emails.
6. While running this command, it will start the wireless interface in monitor mode.
7. 802.11g is a popular wireless transmission over distances of 150 feets and speeds upto 54mbps compared with the 11 mbps of 802.11b standard. It operates in 2.4Ghz range and thus compatibel with it. This standard uses the Ethernet protocol and CSMA/CA access method.
8. Aircrack method is the best choice for uncovering network key.
9. MAC filtering will be enable on the access point when running the Airsnrf rule.
10. Bluetooth operates at frequencies between 2402 and 2480Mhz ,or 2400 and 2483.5 Mhz including guard bands 2 MHz wide at bottom end and 3.5 Mhz wide at the top.
11. WPA and WPA 2 are the two security protocols and certification programs developed by Wi-fi alliance to secure Wireless computer networks.
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.