Certified Ethical Hacker (CEHv9) Questions and answers
59. In 2007, this wireless security algorithm was rendered useless by capturing packets and discovering
the passkey in a matter of seconds. This security flaw led to a network invasion of TJ Maoo and data theft through a technique known as wardriving.
Which Algorithm is this referring to?
A. Wi-Fi Protected Access 2 (WPA2)
B. Wi-Fi Protected Access (WPA)
C. Temporal Key Integrity Protocol (TKIP)
D. Wired Equivalent Privacy (WEP)
60. It is a kind of malware (malicious software) that criminals install on your computer so they can
lock it from a remote location. This malware generates a pop-up window, webpage, or email warning from what looks like an official authority.
It explains that your computer has been locked because of possible illegal activities on it and demands payment before you can access your
files and programs again.
Which of the following terms best matches the definition?