Reference no: EM132344713
Question: Answer the following questions:
1. What is a default password database?
2. Differentiate between syllable, rule-based, and hybrid password attacks.
3. How is password-cracking software classified?
4. How does a password cracker work?
5. Why is a rule-based attack considered more powerful than other password-cracking methods?
6. How is security provided for the connection between devices and wireless access points?
7. What is the difference between active wireless scanning and passive wireless scanning?
8. How can an attacker hijack wireless network traffic?
9. How do electronic emanations help an attacker access a wireless network?
10. Describe what should be included in a report for a forensic investigation involving a wireless network.