Certified Ethical Hacker (CEHv9) Questions and answers
99. This tool is an 802.11 WEP and WPA-PSK keys cracking program that can recover keys once enough data packets have been captured. It implements the standard FMS attack along with some optimizations like KoreK attacks, as well as the PTW attack, thus making the attack much faster compared to other WEP cracking tools.
Which of the following tools is being described?
100. Which of the following statements regarding ethical hacking is incorrect?
A. Ethical hacking should not involve writing to or modifying the target systems.
B. An organization should use ethical hackers who do not sell vendor hardware/software or other consulting services.
C. Ethical hackers should never use tools or methods that have the potential of exploiting vulnerabilities in an organization's systems.