Given: One of the security risks introduced by WPA2-Personal is an attack conducted by an authorized network user who knows the passphrase. In order to decrypt other users’ traffic, the attacker must obtain certain information from the 4-way handshake of the other users.
In addition to knowing the Pairwise Master Key (PMK) and the supplicant’s address (SA), what other three inputs must be collected with a protocol analyzer to recreate encryption keys? (Choose 3)
Authenticator nonce
Supplicant nonce
Authenticator address (BSSID)
GTKSA
Authentication Server nonce
Correct answer: ABC
Question 2
What is a primary criteria for a network to qualify as a Robust Security Network (RSN)?
Token cards must be used for authentication.
Dynamic WEP-104 encryption must be enabled.
WEP may not be used for encryption.
WPA-Personal must be supported for authentication and encryption.
WLAN controllers and APs must not support SSHv1.
Correct answer: C
Question 3
Given: You are using a Wireless Aggregator utility to combine multiple packet captures. One capture exists for each of channels 1, 6 and 11. What kind of troubleshooting are you likely performing with such a tool?