1. Which of the following Wi-Fi encryption protocols is vulnerable to possible attacks?
a. WPA
b. WPA2
c. ARP
d. WEP
e. SSH
2. Spoofing attacks can also be referred to as masquerading (true or false).
a. True
b. False
3. What is the most effective countermeasure against password cracking attacks?
a. Not using passwords
b. Using numbers in the password field
c. Encrypting the password using DE
d. Using strong encryption algorithms, like AES
e. Using a birthday as the password value
4. What is the name of the network attack in which the attacker . . .
The content below this message is for members only.