[Free] 2018(Jan) EnsurePass Dumpsleader ECCouncil 312-50 Dumps with VCE and PDF 411-420

Ensurepass.com : Ensure you pass the IT Exams
2018 Jan ECCouncil Official New Released 312-50
100% Free Download! 100% Pass Guaranteed!

Ethical Hacking and Countermeasures

Question No: 411 – (Topic 15)

WEP is used on 802.11 networks, what was it designed for?

  1. WEP is designed to provide a wireless local area network (WLAN) with a level of security and privacy comparable to what it usually expected of a wired LAN.

  2. WEP is designed to provide strong encryption to a wireless local area network (WLAN) with a lever of integrity and privacy adequate for sensible but unclassified information.

  3. WEP is designed to provide a wireless local area network (WLAN) with a level of availability and privacy comparable to what is usually expected of a wired LAN.

  4. WEOP is designed to provide a wireless local area network (WLAN) with a level of privacy comparable to what it usually expected of a wired LAN.

Answer: A

Explanation: WEP was intended to provide comparable confidentiality to a traditional wired network (in particular it does not protect users of the network from each other), hence the name. Several serious weaknesses were identified by cryptanalysts – any WEP key can be cracked with readily available software in two minutes or less – and WEP was superseded by Wi-Fi Protected Access (WPA) in 2003, and then by the full IEEE 802.11i standard (also known as WPA2) in 2004.

Question No: 412 – (Topic 15)

Which of the following wireless technologies can be detected by NetStumbler? (Select all that apply)

A. 802.11b

B. 802.11e C. 802.11a D. 802.11g E. 802.11

Answer: A,C,D Explanation:

If you check the website, cards for all three (A, B, G) are supported. See: http://www.stumbler.net/

Question No: 413 – (Topic 15)

Matthew re-injects a captured wireless packet back onto the network. He does this hundreds of times within a second. The packet is correctly encrypted and Matthew assumes it is an ARP request packet. The wireless host responds with a stream of responses, all individually encrypted with different IVs. What is this attack most appropriately called?

  1. Spoof Attack

  2. Replay Attack

  3. Inject Attack

  4. Rebound Attack

Answer: B

Explanation: A replay attack is a form of network attack in which a valid data transmission is maliciously or fraudulently repeated or delayed. This is carried out either by the originator or by an adversary who intercepts the data and retransmits it.

Question No: 414 – (Topic 15)

Access control is often implemented through the use of MAC address filtering on

wireless Access Points. Why is this considered to be a very limited security measure?

  1. Vendors MAC address assignment is published on the Internet.

  2. The MAC address is not a real random number.

  3. The MAC address is broadcasted and can be captured by a sniffer.

  4. The MAC address is used properly only on Macintosh computers.

Answer: C

Question No: 415 – (Topic 15)

Derek has stumbled upon a wireless network and wants to assess its security. However, he does not find enough traffic for a good capture. He intends to use AirSnort on the captured traffic to crack the WEP key and does not know the IP address range or the AP. How can he generate traffic on the network so that he can capture enough packets to crack the WEP key?

  1. Use any ARP requests found in the capture

  2. Derek can use a session replay on the packets captured

  3. Derek can use KisMAC as it needs two USB devices to generate traffic

  4. Use Ettercap to discover the gateway and ICMP ping flood tool to generate traffic

Answer: D

Explanation: By forcing the network to answer to a lot of ICMP messages you can gather enough packets to crack the WEP key.

Question No: 416 – (Topic 15)

Sally is a network admin for a small company. She was asked to install wireless accesspoints in the building. In looking at the specifications for the access-points, she sees that all of them offer WEP. Which of these are true about WEP?

Select the best answer.

  1. Stands for Wireless Encryption Protocol

  2. It makes a WLAN as secure as a LAN

  3. Stands for Wired Equivalent Privacy

  4. It offers end to end security

Answer: C

Explanation: Explanations:

WEP is intended to make a WLAN as secure as a LAN but because a WLAN is not constrained by wired, this makes access much easier. Also, WEP has flaws that make it less secure than was once thought.WEP does not offer end-to-end security. It only attempts to protect the wireless portion of the network.

Question No: 417 – (Topic 15)

In order to attack wireless network, you put up an access point and override the signal of the real access point. And when users send authentication data, you are able to capture it. What kind of attack is this?

  1. WEP Attack

  2. Drive by hacking

  3. Rogue Access Point Attack

  4. Unauthorized Access Point Attack

Answer: C

Explanation: A rogue access point is a wireless access point that has either been installed on a secure company network without explicit authorization from a local network management or has been created to allow a cracker to conduct a man-in-the-middle attack.

Question No: 418 – (Topic 15)

RC4 is known to be a good stream generator. RC4 is used within the WEP standard

on wireless LAN. WEP is known to be insecure even if we are using a stream cipher that is known to be secured.

What is the most likely cause behind this?

  1. There are some flaws in the implementation.

  2. There is no key management.

  3. The IV range is too small.

  4. All of the above.

  5. None of the above.

Answer: D

Explanation: Because RC4 is a stream cipher, the same traffic key must never be used twice. The purpose of an IV, which is transmitted as plain text, is to prevent any repetition, but a 24-bit IV is not long enough to ensure this on a busy network. The way the IV was used also opened WEP to a related key attack. For a 24-bit IV, there is a 50% probability the same IV will repeat after 5000 packets.

Many WEP systems require a key in hexadecimal format. Some users choose keys that spell words in the limited 0-9, A-F hex character set, for example C0DE C0DE C0DE C0DE. Such keys are often easily guessed.

Question No: 419 – (Topic 15)

Jackson discovers that the wireless AP transmits 128 bytes of plaintext, and the station responds by encrypting the plaintext. It then transmits the resulting ciphertext using the same key and cipher that are used by WEP to encrypt subsequent network traffic. What authentication mechanism is being followed here?

  1. no authentication

  2. single key authentication

  3. shared key authentication

  4. open system authentication

Answer: C

Explanation: Explantion: The following picture shows how the WEP authentication procedure:

Ensurepass 2018 PDF and VCE

Question No: 420 – (Topic 15)

In an attempt to secure his wireless network, Bob turns off broadcasting of the SSID. He concludes that since his access points require the client computer to have the proper SSID, it would prevent others from connecting to the wireless network.

Unfortunately unauthorized users are still able to connect to the wireless network. Why do you think this is possible?

  1. Bob forgot to turn off DHCP.

  2. All access points are shipped with a default SSID.

  3. The SSID is still sent inside both client and AP packets.

  4. Bob’s solution only works in ad-hoc mode.

Answer: B

Explanation: All access points are shipped with a default SSID unique to that manufacturer, for example 3com uses the default ssid comcomcom.

100% Ensurepass Free Download!
Download Free Demo:312-50 Demo PDF
100% Ensurepass Free Guaranteed!
312-50 Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.