An attacker with access to the inside network of a small company launches a successful STP manipulation attack. What will he do next?
Correct Answer:A
What is the main security service a cryptographic hash provides?
Correct Answer:D
PGP, SSL, and IKE are all examples of which type of cryptography?
Correct Answer:C
Windows LAN Manager (LM) hashes are known to be weak.
Which of the following are known weaknesses of LM? (Choose three.)
Correct Answer:ABD
Which of the following tools is used to detect wireless LANs using the 802.11a/b/g/n WLAN standards on a linux platform?
Correct Answer:A