2025/2026 Most Recent Actual Complete Real Exam
Questions And Verified Answers | 100% Correct
Answers | Graded A+ Guaranteed Success!!
Newest Exam | Just Released!!
Wireless network security - ANSWER-Chief method of
protecting traffic is encryption. The encryption is used by
802.11 wireless devices. The most common wireless families
are - wired equivalent privacy (wep) - Wi-Fi protected access (
wpa) - Wi-Fi protected access v2 (wpa2)
WPA2 - ANSWER-Wireless Protected Access 2. Wireless
network encryption
system. Offers the strongest
security
VPN - ANSWER-Virtual Private Network. Can provide us with
a solution for
sending sensitive traffic over unsecured networks. VPN
connection is often
referred to as a tunnel. Is encrypted connection
between two points
,Secure Protocols - ANSWER-Easiest way we can protect our
data
Mobile devices - ANSWER-Any device that communicate via a
wireless network
kismet - ANSWER-Commonly used to detect wireless access
points and can
find them even when attempts have been made to make
doing so difficult
Netstumbler - ANSWER-A Windows tool used to detect wireless
access points.
Does not have as full feature set
as kismet
Portscanners - ANSWER-check to see what ports are open
Nmap - ANSWER-A network utility designed to scan a
network and create a
map. Frequently used as a vulnerability scanner.
(Network mapper)
Packet sniffers - ANSWER-A network or protocol analyzer, is a
tool that can intercept traffic on a network, commonly referred
to as sniffing. Sniffing basically amounts to listening for any
traffic that the network interface of our computer or device can
see, whether it was intended to be received by us or not. Some
,examples might be Wireshark (GUI) or Tcpdump (command-line
tool)
Wireshark - ANSWER-A widely used packet analyzer.
TCP Dump - ANSWER-Command line packet sniffing tool .
Runs on Linux and
unx operating
systems
Honeypots - ANSWER-can detect, monitor, and sometimes
tamper with the activities of an attacker. are configured to
deliberately display vulnerabilities or materials that would make
the system attractive to an attacker.
hping3 - ANSWER-A tool used to test the security of firewalls
and map network
topology.
- constructs specially crafted ICMP packets to evade measures
to hide devices
behind
firewall
- scripting functionality to test
firewall/IDS
Anti-malware tools - ANSWER-applications detect threats in
the same way as
an IDS either by matching against a signature or by
detecting anomalous
, activities taking
place.
executable space protection - ANSWER-A hardware and
software-based technology that prevents certain portions of the
memory used by the operating system and applications from
being used to execute code.
Buffer overflow - ANSWER-Occur when we do not properly
account for the size
of the data input into our
applications
Software firewall - ANSWER-This type of firewall generally
contains a subset of the features on a large firewall appliance
but is often capable of similar packet filtering and stateful
packet inspection activities
Host Intrusion Detection System (HIDS) - ANSWER-A system
used to analyze
the activities on or directed at the network interface of a
particular host
Scanners - ANSWER-We can look for ports and versions of
service that are running, examine banners displayed by
services for information. Examine the info our systems display
over the network and similar tasks