CompTIA Security Plus Mock Test Q149

A malicious user is sniffing a busy encrypted wireless network waiting for an authorized client to connect to it. Only after an authorized client has connected and the hacker was able to capture the client handshake with the AP can the hacker begin a brute force attack to discover the encryption key. Which of the following attacks is taking place?

A. IV attack
B. WEP cracking
C. WPA cracking
D. Rogue AP

Correct Answer: C
Section: Network Security

There are three steps to penetrating a WPA-protected network.

Incorrect Answers:
A: Packet sniffing is not used for an IV attack.
B: WEP provides protection from packet sniffing and eavesdropping against wireless transmissions
D: Packet sniffing is not used for the Rogue AP.

Stewart, James Michael, CompTIA Security+ Review Guide, Sybex, Indianapolis, 2014, pp. 64, 189, 192,2981-6.html