exam questions

Exam 312-50v11 All Questions

View all questions & answers for the 312-50v11 exam

Exam 312-50v11 topic 1 question 176 discussion

Actual exam question from ECCouncil's 312-50v11
Question #: 176
Topic #: 1
[All 312-50v11 Questions]

Attacker Rony installed a rogue access point within an organization's perimeter and attempted to intrude into its internal network. Johnson, a security auditor, identified some unusual traffic in the internal network that is aimed at cracking the authentication mechanism. He immediately turned off the targeted network and tested for any weak and outdated security mechanisms that are open to attack.
What is the type of vulnerability assessment performed by Johnson in the above scenario?

  • A. Wireless network assessment
  • B. Application assessment
  • C. Host-based assessment
  • D. Distributed assessment
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
blacksheep6r
Highly Voted 2 years, 7 months ago
Wireless Network Assessment Wireless network assessment determines the vulnerabilities in an organization’s wireless networks. In the past, wireless networks used weak and defective data encryption mechanisms. Now, wireless network standards have evolved, but many networks still use weak and outdated security mechanisms and are open to attack. Wireless network assessments try to attack wireless authentication mechanisms and gain unauthorized access. This type of assessment tests wireless networks and identifies rogue networks that may exist within an organization’s perimeter. These assessments audit client-specified sites with a wireless network. They sniff wireless network traffic and try to crack encryption keys. Auditors test other network access if they gain access to the wireless network.
upvoted 20 times
artillery
2 years ago
learning too. kudos! for the good work.
upvoted 2 times
...
Silascarter
2 years, 5 months ago
Nice of you to keep the explanations coming. Keep it up
upvoted 3 times
...
...
mamu998
Most Recent 8 months ago
"for any weak and outdated security mechanisms that are open to attack". i think it's more broader than 'wireless network assessment', i think the correct answer should be 'host based assessment'.
upvoted 1 times
...
Daniel8660
1 year, 6 months ago
Selected Answer: A
Types of Vulnerability Assessment - Wireless Network Assessment Many wireless networks still use weak and outdated security mechanisms and are open to attack. Wireless network assessments try to attack wireless authentication mechanisms and gain unauthorized access. This type of assessment tests wireless networks and identifies rogue networks that may exist within an organization’s perimeter. (P.529/513)
upvoted 4 times
...
uday1985
1 year, 10 months ago
Security mechanisms are implemented and configured on the Wireless network. it cant be host or others
upvoted 2 times
...
ANDRESCB1988
2 years, 9 months ago
correct
upvoted 2 times
...
KelvinNg
2 years, 11 months ago
Correct
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago