QUESTION 41 Which of the following is an attack in which a secret value like a h
ID: 3721298 • Letter: Q
Question
QUESTION 41 Which of the following is an attack in which a secret value like a hash ?? captured and then reused at a ater time to gain access to a system without ever decrypting or decoding the hash O A- Replay Attacks B. Brute Force Attacks c. Cryptography Attacks D. John the Ripper Attacks QUESTION 42 In order to attack a wireless network, you put up an access point and override the signal of the real access point As users send authentication data, you are able to capture it. What kind of attack is this? A. WEP attack 08. Drive by hacking O c- Rogue access point atack O o. unauthorized access port attack choose the best arsweExplanation / Answer
Q. 41 - C
In cryptographic attacks, the message at the receiver end is encrypted message and before that, it is not decrypted.
Q. 42 - C
In rogue access point attacks, the hacker may set up a new access point to access a wireless network and download information from it.
Related Questions
Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.