Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam 312-50v12 All Questions

View all questions & answers for the 312-50v12 exam

Exam 312-50v12 topic 1 question 81 discussion

Actual exam question from ECCouncil's 312-50v12
Question #: 81
Topic #: 1
[All 312-50v12 Questions]

You are a penetration tester tasked with testing the wireless network of your client Brakeme SA. You are attempting to break into the wireless network with the SSID “Brakeme-Internal.” You realize that this network uses WPA3 encryption.
Which of the following vulnerabilities is the promising to exploit?

  • A. Cross-site request forgery
  • B. Dragonblood
  • C. Key reinstallation attack
  • D. AP misconfiguration
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
g_man_rap
7 months ago
A. Cross-site request forgery (CSRF): This is a web security vulnerability that allows an attacker to induce users to perform actions that they do not intend to perform. It targets web applications and is not related to breaking wireless encryption. B. Dragonblood: This is a vulnerability that was found in the WPA3 Wi-Fi security standard. It consists of a set of issues that affect WPA3's Simultaneous Authentication of Equals (SAE) handshake (also known as Dragonfly), which is a part of the protocol meant to improve upon the security of WPA2. C. Key reinstallation attack (KRACK): This refers to a security flaw in the WPA2 protocol that allows attackers to intercept and decrypt Wi-Fi traffic between wireless devices and the targeted Wi-Fi network. This would not be relevant to WPA3, which is designed to mitigate such vulnerabilities that were present in WPA2. D. AP misconfiguration: This refers to improper setup or configuration errors made on wireless access points. While this could potentially include errors in implementing WPA3, AP misconfiguration is a broad term that doesn't specifically target WPA3's encryption.
upvoted 3 times
...
Vincent_Lu
1 year, 5 months ago
B. Dragonblood
upvoted 2 times
...
sausageman
1 year, 7 months ago
Selected Answer: B
B. Dragonblood
upvoted 1 times
...
sausageman
1 year, 7 months ago
B. Dragonblood
upvoted 1 times
...
jeremy13
1 year, 7 months ago
Selected Answer: B
B. Dragonblood Like 312-50v11 Q224 same as tc5899 CEH V12 Module16 P2510
upvoted 3 times
...
tc5899
1 year, 7 months ago
Selected Answer: B
B- Dragonblood is a set of vulnerabilities in the WPA3 security standard that allows attackers to recover keys, downgrade security mechanisms, and launch various information-theft attacks Attackers can use various tools, such as Dragonslayer, Dragonforce, Dragondrain, and Dragontime, to exploit these vulnerabilities and launch attacks on WPA3-enabled networks. CEH v11 manual. pg. 2322
upvoted 3 times
...
eli117
1 year, 7 months ago
Selected Answer: C
C. Key reinstallation attack WPA3 is the latest encryption protocol for wireless networks and is considered more secure than its predecessor, WPA2. However, WPA3 is still susceptible to the Key Reinstallation Attack (KRACK), which is a vulnerability that allows attackers to intercept and manipulate network traffic. In a KRACK attack, an attacker exploits a flaw in the WPA3 protocol that allows them to reinstall an already-in-use key. This can enable the attacker to decrypt, replay, or manipulate network traffic, which can compromise the security of the network.
upvoted 1 times
woohoolou
1 year, 3 months ago
KRACK is for WPA2
upvoted 2 times
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...