Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GAQM Exam CPEH-001 Topic 4 Question 76 Discussion

Actual exam question for GAQM's CPEH-001 exam
Question #: 76
Topic #: 4
[All CPEH-001 Questions]

During a wireless penetration test, a tester detects an access point using WPA2 encryption. Which of the following attacks should be used to obtain the key?

Show Suggested Answer Hide Answer
Suggested Answer: C

The order should be Passive information gathering, Network level discovery, Host scanning and Analysis of host scanning.


Contribute your Thoughts:

Catherin
7 days ago
The correct answer is A. Capturing the WPA2 handshake and cracking it is the way to go. That's the standard approach for WPA2 networks.
upvoted 0 times
...
Jani
8 days ago
But isn't it possible to crack WPA2 if you capture the handshake and use a powerful cracking tool?
upvoted 0 times
...
Herschel
9 days ago
I disagree, I believe the answer is C) The tester cannot crack WPA2 because it is in full compliance with the IEEE 802.11i standard.
upvoted 0 times
...
Jani
18 days ago
I think the answer is A) The tester must capture the WPA2 authentication handshake and then crack it.
upvoted 0 times
...

Save Cancel