New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GAQM CPEH-001 Exam - Topic 4 Question 76 Discussion

Actual exam question for GAQM's CPEH-001 exam
Question #: 76
Topic #: 4
[All CPEH-001 Questions]

During a wireless penetration test, a tester detects an access point using WPA2 encryption. Which of the following attacks should be used to obtain the key?

Show Suggested Answer Hide Answer
Suggested Answer: C

The order should be Passive information gathering, Network level discovery, Host scanning and Analysis of host scanning.


Contribute your Thoughts:

0/2000 characters
Afton
3 months ago
Changing MAC addresses won’t help with WPA2!
upvoted 0 times
...
Hyman
3 months ago
I doubt you can’t crack WPA2, seems off.
upvoted 0 times
...
Gaynell
3 months ago
Wait, can’t we just use inSSIDer?
upvoted 0 times
...
Phil
4 months ago
Totally agree, A is the way to go.
upvoted 0 times
...
Elouise
4 months ago
Gotta capture that WPA2 handshake to crack it!
upvoted 0 times
...
Jovita
4 months ago
Changing the MAC address and using AirTraf doesn’t sound familiar to me. I think option D might be a distraction.
upvoted 0 times
...
Helga
4 months ago
I vaguely recall that WPA2 can be cracked under certain conditions, so I think option C is incorrect. It’s not completely secure, right?
upvoted 0 times
...
Delisa
4 months ago
I’m not entirely sure, but I feel like inSSIDer is more for scanning networks rather than cracking keys. Option B seems off to me.
upvoted 0 times
...
Anisha
5 months ago
I remember something about capturing the WPA2 handshake being crucial for cracking the key. I think option A sounds right.
upvoted 0 times
...
Mattie
5 months ago
The key here is to capture the WPA2 handshake, as option A suggests. Once you have that, you can use a tool like Hashcat or John the Ripper to crack the password. Just make sure you have a good wordlist or dictionary prepared.
upvoted 0 times
...
Roosevelt
5 months ago
I'm a little confused by this question. Isn't WPA2 supposed to be secure? I'm not sure if any of these options are actually viable. I'll have to review my notes on wireless security again.
upvoted 0 times
...
Phyliss
5 months ago
Hmm, I'm a bit unsure about this one. I know we covered WPA2 cracking in class, but I can't remember the exact steps. I'll have to think this through carefully.
upvoted 0 times
...
Avery
5 months ago
I'm pretty confident that the answer is A. Capturing the WPA2 handshake and then cracking it is the standard approach for this type of attack.
upvoted 0 times
...
Cherry
5 months ago
Option A sounds right to me. Capturing the handshake and then using a tool like Aircrack-ng to crack the password is the way to go. I've practiced this a few times, so I feel prepared for this type of question.
upvoted 0 times
...
Alayna
5 months ago
Hmm, I'm a bit confused. The function is called "sum" but it seems to be calculating the factorial. I'll need to double-check the logic to make sure I understand what's happening.
upvoted 0 times
...
Derrick
5 months ago
This question seems straightforward, but I want to make sure I understand the key points about NOARCHIVELOG mode before answering.
upvoted 0 times
...
Alyce
5 months ago
Okay, I've got this. The NL-SAS drives are non-volatile SAS drives, so they're likely in the lower-performance tier. I'll go with option B.
upvoted 0 times
...
Heidy
10 months ago
I heard the best way to crack WPA2 is to bake the router a nice cake. You know, social engineering!
upvoted 0 times
...
Pete
10 months ago
Changing the MAC address and using AirTraf? What is this, amateur hour? That's not how you hack WPA2.
upvoted 0 times
Felix
8 months ago
Changing the MAC address and using AirTraf? What is this, amateur hour? That's not how you hack WPA2.
upvoted 0 times
...
Xuan
9 months ago
B) The tester must use the tool inSSIDer to crack it using the ESSID of the network.
upvoted 0 times
...
Leonora
9 months ago
A) The tester must capture the WPA2 authentication handshake and then crack it.
upvoted 0 times
...
...
Chantay
10 months ago
C is completely wrong. Just because WPA2 is a standard doesn't mean it can't be cracked. That's like saying fortress walls can't be breached because they follow architectural standards.
upvoted 0 times
Chantell
9 months ago
C) C is completely wrong. Just because WPA2 is a standard doesn't mean it can't be cracked. That's like saying fortress walls can't be breached because they follow architectural standards.
upvoted 0 times
...
Brett
9 months ago
B) The tester must use the tool inSSIDer to crack it using the ESSID of the network.
upvoted 0 times
...
Kati
9 months ago
A) The tester must capture the WPA2 authentication handshake and then crack it.
upvoted 0 times
...
...
Carin
10 months ago
B is ridiculous. inSSIDer can't crack WPA2, that's just nonsense.
upvoted 0 times
...
Catherin
11 months ago
The correct answer is A. Capturing the WPA2 handshake and cracking it is the way to go. That's the standard approach for WPA2 networks.
upvoted 0 times
Gail
10 months ago
B) But wouldn't changing the MAC address also be a possible method to obtain the key?
upvoted 0 times
...
Bette
10 months ago
A) The tester must capture the WPA2 authentication handshake and then crack it.
upvoted 0 times
...
...
Jani
11 months ago
But isn't it possible to crack WPA2 if you capture the handshake and use a powerful cracking tool?
upvoted 0 times
...
Herschel
11 months ago
I disagree, I believe the answer is C) The tester cannot crack WPA2 because it is in full compliance with the IEEE 802.11i standard.
upvoted 0 times
...
Jani
11 months ago
I think the answer is A) The tester must capture the WPA2 authentication handshake and then crack it.
upvoted 0 times
...

Save Cancel