a. What kind of physical device is an evil twin access point? 8a1.) An evil twin access
Question:
a. What kind of physical device is an evil twin access point?
8a1.) An evil twin access point is usually _______.
a. A reprogrammed access point
b. A laptop computer
c. A rogue access point
d. Any of the above
8a2.) If a company uses 802.11i for its core security protocol, an evil twin access point will set up _______ 802.11i connection(s).
a. One
b. Two
c. Four
d. None of the above
b. What does the evil twin do after initial association when the victim client transmits?
8b.) When a wireless client in an evil twin attack transmits, _______.
a. The evil twin reads the packet, encrypts it, and passes on the packet
b. The evil twin reads the frame, encrypts it, and passes on the frame
c. The evil twin reads the packet and passes on the packet
d. The evil twin reads the frame and passes on the frame
c. Distinguish between evil twin access points and rogue access points. (The answer is not explicitly in the text.)
8c.) Which of the following is usually set up by a hacker outside the building?
a. A rogue access point
b. An evil twin access point
c. Both A and B
d. Neither A nor B
d. How are VPN s able to defeat evil twin attacks? Explain in detail.
8d.) Which of the following secures communication between the wireless computer and the server it wishes to use against evil twin attacks?
a. VLANs
b. VPNs
c. 802.1X mode
d. None of the above
8d.) In VPNs designed to frustrate evil twin attacks, the shared secret between the client and the server is _______.
a. Transmitted in the clear
b. Transmitted with cryptographic protections
c. Not transmitted
d. Any of the above.
8d.) AVPN provides _______.
a. Link security
b. End-to-end security
c. Comprehensive security
d. None of the above
e. How can you tell if your client computer has succumbed to an evil twin attack?
8e.) You can test whether an evil twin attack has taken place against your wireless client.
a. True
b. False
f. Why is this important?
8f.) You should use a VPN _______.
a. If you know that an evil twin access point is in use.
b. If you know that your device has been compromised by an evil twin attack.
c. Always
d. Never
Step by Step Answer:
Business Data Networks and Security
ISBN: 978-0134817125
11th Edition
Authors: Raymond R. Panko, Julia L. Panko