02.03.2018 Views

Sybex CEH Certified Ethical Hacker Version 8 Study Guide

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

370 Chapter 15 ■ Wireless Networking<br />

7. When a wireless client is attached to an access point, it is known as which of the following?<br />

A. Infrastructure<br />

B. Client-server<br />

C. Peer-to-peer<br />

D. Ad hoc<br />

8. A is used to attack an NIDS.<br />

A. NULL session<br />

B. DoS<br />

C. Shellcode<br />

D. Port scan<br />

9. Which of the following uses a database of known attacks?<br />

A. Signature<br />

B. Anomaly<br />

C. Behavior<br />

D. Sniffer<br />

10. A honeyspot is designed to do what?<br />

A. Look for patterns of known attacks<br />

B. Look for deviations from known traffic patterns<br />

C. Attract victims to connect to it<br />

D. Analyze attacks patterns<br />

11. An SSID is used to do which of the following?<br />

A. Identify a network<br />

B. Identify clients<br />

C. Prioritize traffic<br />

D. Mask a network<br />

12. AirPcap is used to do which of the following?<br />

A. Assist in the sniffing of wireless traffic<br />

B. Allow for network traffic to be analyzed<br />

C. Allow for the identification of wireless networks<br />

D. Attack a victim<br />

13. What is a rogue access point?<br />

A. An access point not managed by a company<br />

B. An unmanaged access point<br />

C. A second access point<br />

D. A honeypot device

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!