Which of the following are the most likely threats to his computer? (Choose two.)

Last Updated on March 20, 2022 by Admin 2

Victor wants to use Wireless Zero Configuration (WZC) to establish a wireless network connection using his computer running on Windows XP operating system.

Which of the following are the most likely threats to his computer? (Choose two.)

  • Information of probing for networks can be viewed using a wireless analyzer and may be used to gain access.
  • Attacker can use the Ping Flood DoS attack if WZC is used.
  • Attacker by creating a fake wireless network with high power antenna cause Victor’s computer to associate with his network to gain access.
  • It will not allow the configuration of encryption and MAC filtering. Sending information is not secure on wireless network.
Explanation:
Wireless Zero Configuration (WZC), also known as Wireless Auto Configuration, or WLAN AutoConfig is a wireless connection management utility included with Microsoft Windows XP and later operating systems as a service that dynamically selects a wireless network to connect to based on a user’s preferences and various default settings. This can be used instead of, or in the absence of, a wireless network utility from the manufacturer of a computer’s wireless networking device. The drivers for the wireless adapter query the NDIS Object IDs and pass the available network names to the service. WZC also introduce some security threats, which are as follows: WZC will probe for networks that are already connected. This information can be viewed by anyone using a wireless analyzer and can be used to set up fake access points to connect. WZC attempts to connect to the wireless network with the strongest signal. Attacker can create fake wireless networks with high- power antennas and cause computers to associate with his access point.
Answer: D is incorrect. WZC does not interfere in the configuration of encryption and MAC filtering.
Answer: B is incorrect. In a ping flood attack, an attacker sends a large number of ICMP packets to the target computer using the ping command, i.e., ping -f target_IP_address. When the target computer receives these packets in large quantities, it does not respond and hangs.
0 0 votes
Article Rating
Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments