exam questions

Exam 312-50v11 All Questions

View all questions & answers for the 312-50v11 exam

Exam 312-50v11 topic 1 question 400 discussion

Actual exam question from ECCouncil's 312-50v11
Question #: 400
Topic #: 1
[All 312-50v11 Questions]

In this attack, an adversary tricks a victim into reinstalling an already-in-use key. This is achieved by manipulating and replaying cryptographic handshake messages. When the victim reinstalls the key, associated parameters such as the incremental transmit packet number and receive packet number are reset to their initial values.
What is this attack called?

  • A. Evil twin
  • B. Chop chop attack
  • C. Wardriving
  • D. KRACK
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
josevirtual
Highly Voted 10 months, 2 weeks ago
I'm taking the exam in a couple of hours. Good luck for everyone!!!
upvoted 6 times
josevirtual
10 months, 2 weeks ago
Passed!! All the questions of the exam were in this dump.
upvoted 9 times
...
...
victorfs
Most Recent 6 months, 4 weeks ago
Krack, option D is correct.
upvoted 2 times
...
Daniel8660
1 year, 1 month ago
Selected Answer: D
Authentication Attacks - Key Reinstallation Attack (KRACK) The key reinstallation attack (KRACK) exploits the flaws in the implementation of the four-way handshake process in the WPA2 authentication protocol.The attacker exploits the four-way handshake of the WPA2 protocol by forcing Nonce reuse. In this attack, the attacker captures the victim’s ANonce key that is already in use to manipulate and replay cryptographic handshake messages. (P.2233/2217)
upvoted 2 times
...
Daniel8660
1 year, 2 months ago
Selected Answer: D
Authentication Attacks Key Reinstallation Attack (KRACK) The key reinstallation attack (KRACK) exploits the flaws in the implementation of the four-way handshake process in the WPA2 authentication protocol. Attacker captures the victim’s ANonce key that is already in use to manipulate and replay cryptographic handshake messages. (P.2233)
upvoted 1 times
...
dinonino
1 year, 2 months ago
KRACK vulnerabilities: WPA2 has a significant vulnerability to an exploit known as key reinstallation attack (KRACK). This exploit may allow attackers to sniff packets, hijack connections, inject malware, and decrypt packets. The key reinstallation attack (KRACK) exploits the flaws in the implementation of the four-way handshake process in the WPA2 authentication protocol, which is used to establish a connection between a device and an AP. All secure Wi-Fi networks use the four-way handshake process to establish connections and to generate a fresh encryption key that will be used to encrypt the network traffic.
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...