Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GAQM Exam CPEH-001 Topic 4 Question 76 Discussion

Actual exam question for GAQM's CPEH-001 exam
Question #: 76
Topic #: 4
[All CPEH-001 Questions]

During a wireless penetration test, a tester detects an access point using WPA2 encryption. Which of the following attacks should be used to obtain the key?

Show Suggested Answer Hide Answer
Suggested Answer: C

The order should be Passive information gathering, Network level discovery, Host scanning and Analysis of host scanning.


Contribute your Thoughts:

Heidy
28 days ago
I heard the best way to crack WPA2 is to bake the router a nice cake. You know, social engineering!
upvoted 0 times
...
Pete
1 months ago
Changing the MAC address and using AirTraf? What is this, amateur hour? That's not how you hack WPA2.
upvoted 0 times
...
Chantay
1 months ago
C is completely wrong. Just because WPA2 is a standard doesn't mean it can't be cracked. That's like saying fortress walls can't be breached because they follow architectural standards.
upvoted 0 times
Chantell
3 days ago
C) C is completely wrong. Just because WPA2 is a standard doesn't mean it can't be cracked. That's like saying fortress walls can't be breached because they follow architectural standards.
upvoted 0 times
...
Brett
20 days ago
B) The tester must use the tool inSSIDer to crack it using the ESSID of the network.
upvoted 0 times
...
Kati
22 days ago
A) The tester must capture the WPA2 authentication handshake and then crack it.
upvoted 0 times
...
...
Carin
1 months ago
B is ridiculous. inSSIDer can't crack WPA2, that's just nonsense.
upvoted 0 times
...
Catherin
2 months ago
The correct answer is A. Capturing the WPA2 handshake and cracking it is the way to go. That's the standard approach for WPA2 networks.
upvoted 0 times
Gail
24 days ago
B) But wouldn't changing the MAC address also be a possible method to obtain the key?
upvoted 0 times
...
Bette
1 months ago
A) The tester must capture the WPA2 authentication handshake and then crack it.
upvoted 0 times
...
...
Jani
2 months ago
But isn't it possible to crack WPA2 if you capture the handshake and use a powerful cracking tool?
upvoted 0 times
...
Herschel
2 months ago
I disagree, I believe the answer is C) The tester cannot crack WPA2 because it is in full compliance with the IEEE 802.11i standard.
upvoted 0 times
...
Jani
2 months ago
I think the answer is A) The tester must capture the WPA2 authentication handshake and then crack it.
upvoted 0 times
...

Save Cancel