Question: QUESTION 45 In an attempt to secure his 802.11b wireless network, Bob decides to use strategic antenna positioning. He places the antennas for the access

QUESTION 45 In an attempt to secure his 802.11b wireless network, Bob decides to use strategic antenna positioning. He places the antennas for the access points near the center of the building. For those access points near the outer edge of the building he uses semi-directional antennas that face towards the buildings center. There is a large parking lot and outlying field surrounding the building that extends out half a mile around the building. Bob figures that with this and his placement of antennas, his wireless network will be safe from attack. Which of the following statements is true? O A Bob's network will not be safe until he also enables WEP B. With the 300-foot limit of a wireless signal, Bob's network is safe c. Bob's network will be safe but only if he doesn't switch to 802.11a OD. Wireless signals can be detected from miles away, Bob's network is not safe choose the best answer O A O D QUESTION 46 Joseph is the Web site administrator for the Mason Insurance in New York, whose primary website is located at http:/www.masonins.com/. Joseph uses his laptop computer regularty for website administration. One night, an associate notifies Joseph that the main Mason Insurance web site had been vandalized In place of the legitimate content, the hacker had left a message "H@cker Mess@ge: YOu @re De@d Fre@ks! Joseph surfed to the Web site from his office, which was directly connected to Mason Insurance's internal network using his laptop. However, no changes were apparent to him and he could see the legitimate content. Joseph was puzzied when another employee called in to report the defaced website. Joseph logged off the company's internal LAN and accessed the company Web site using his dial-up ISP connection He browsed to http:l/www.masonins.com/ and saw the following on the web page H@ckermailto H@cker Mess@gemailto Mess@ge: You @re De@dmailto De@d! Fre@ksmailto Fre@ks! After seeing the defaced Web site, he disconnected his dial-up line, reconnected to the internal network, and used Secure Shell (SSH) to log in directly to the Web server. He ran Tripwire against the entire Web site, and found that every system file and all the Web content on the server were intact. choose the brst answer How did the attacker accomplish this hack? ? A. SQL injection OB- ARP spoofing c.DNS poisoning D. Routing table injection
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
