A hacker has gained access to sensitive network files. In analyzing the attack, it is found that the hacker gained access over a wireless segment of the network. It is further discovered that the only security measure in place on the wireless network is MAC Address Filtering. How is it likely that the hacker gained access to the network?

IT Questions BankCategory: CCNA Discovery v4A hacker has gained access to sensitive network files. In analyzing the attack, it is found that the hacker gained access over a wireless segment of the network. It is further discovered that the only security measure in place on the wireless network is MAC Address Filtering. How is it likely that the hacker gained access to the network?

A hacker has gained access to sensitive network files. In analyzing the attack, it is found that the hacker gained access over a wireless segment of the network. It is further discovered that the only security measure in place on the wireless network is MAC Address Filtering. How is it likely that the hacker gained access to the network?

  • The attacker mounted a denial of service attack to overwhelm the firewall before penetrating the wireless LAN.
  • The hacker gained wireless access to the MAC address database and added his own MAC address to the list of permitted addresses.
  • The hacker used a software tool to crack the shared hexadecimal wireless key.
  • The hacker obtained the MAC address of a permitted host, and cloned it on his wireless laptop NIC.

Exam with this question: CCNA Discovery 2: DsmbISP Chapter 8 Exam

Subscribe
Notify of
guest

0 Comments
Inline Feedbacks
View all comments
0
Would love your thoughts, please comment.x
()
x