Cyber Monday 2024! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GIAC Exam GSNA Topic 1 Question 3 Discussion

Actual exam question for GIAC's GSNA exam
Question #: 3
Topic #: 1
[All GSNA Questions]

Which of the following is a wireless auditing tool that is used to pinpoint the actual physical location of wireless devices in the network?

Show Suggested Answer Hide Answer
Suggested Answer: B

Ekahau is an easy-to-use powerful and comprehensive tool for network site surveys and optimization. It is an auditing tool that can be used

to pinpoint the actual physical location of wireless devices in the network. This tool can be used to make a map of the office and then perform

the survey of the office. In the process, if one finds an unknown node, ekahau can be used to locate that node.

Answer D is incorrect. AirSnort is a Linux-based WLAN WEP cracking tool that recovers encryption keys. AirSnort operates by passively

monitoring transmissions. It uses Ciphertext Only Attack and captures approximately 5 to 10 million packets to decrypt the WEP keys.

Answer C is incorrect. Kismet is a Linux-based 802.11 wireless network sniffer and intrusion detection system. It can work with any

wireless card that supports raw monitoring (rfmon) mode. Kismet can sniff 802.11b, 802.11a, 802.11g, and 802.11n traffic. Kismet can be

used for the following tasks:

To identify networks by passively collecting packets

To detect standard named networks

To detect masked networks

To collect the presence of non-beaconing networks via data traffic

Answer A is incorrect. KisMAC is a wireless network discovery tool for Mac OS X. It has a wide range of features, similar to those of

Kismet, its Linux/BSD namesake and far exceeding those of NetStumbler, its closest equivalent on Windows. The program is geared toward

network security professionals, and is not as novice-friendly as similar applications. KisMAC will scan for networks passively on supported

cards - including Apple's AirPort, and AirPort Extreme, and many third-party cards, and actively on any card supported by Mac OS X itself.

Cracking of WEP and WPA keys, both by brute force, and exploiting flaws such as weak scheduling and badly generated keys is supported

when a card capable of monitor mode is used, and packet reinjection can be done with a supported card. GPS mapping can be performed

when an NMEA compatible GPS receiver is attached. Data can also be saved in pcap format and loaded into programs such as Wireshark.


Contribute your Thoughts:

Currently there are no comments in this discussion, be the first to comment!


Save Cancel