Which of the following types of attacks involves the sending of unsolicited messages over a Bluetooth connection?Bluejacking is the sending of unsolicited messages over a Bluetooth connection.
Which type of attack is one in which a rogue wireless access point poses as a legitimate wireless service provider to intercept information that users transmit?Evil twin attack – This attack is one in which a rogue wireless access point poses as a legitimate wireless service provider to intercept information that users transmit.
What type of attack is a wireless disassociation attack?A type of DoS attack in which the attacker breaks the wireless connection between the victim device and the access point. The method is based on the use of a special disassociation frame specified under IEEE 802.11.
In which of the following attacks does an attacker crack the WEP secret key?As an example, the initialization vector (IV) that WEP uses for encryption is 24-bit, which is quite weak and means that IVs are reused with the same key. By examining the repeating result, it was easy for attackers to crack the WEP secret key. This is known as an IV attack.
|