Describe forged deauthentication.

What will be an ideal response?

The attacker monitors transmissions to identify target stations. When a data frame or association response frame is captured, the attacker sends a spoofed deauthentication frame that contains the AP's MAC address. To prevent reconnection, the attacker continues to send deauthentication frames for the duration of the attack.

Computer Science & Information Technology

You might also like to view...

Which of the following is NOT true about the Find Unmatched query wizard?

A) If a one-to-many relationship exists between the two tables, then the wizard will join the two correct fields automatically. B) The wizard uses the primary key from the first table and matches it with the foreign key in the second table in order to determine if there are unmatched records. C) The Find Unmatched Query Wizard is designed to find records in a table or query that have no related records in the same table or query. D) The wizard will try to match the primary key field and the foreign key field if there is a one-to-many relationship between the two tables.

Computer Science & Information Technology

What logs might help you determine how the website was defaced? What kind of information would you look for?

You run a website in an IaaS environment. You wake up to discover that your website has been defaced. Assume you are running a web server and an FTP server in this environment and that both an application proxy and a firewall sit between those servers and the Internet. All of your VMs are running SSH servers.

Computer Science & Information Technology