1. Right Answer: D
Explanation: A De Authentication attack is a technique used in attacking wireless access points or the devices connected to them that forces client devices to disconnect from a network temporarily.
2. Right Answer: A
Explanation: The tool is Reaver. Only 11,000 guesses are necessary to identify the PIN used by a given WPS-enabled network, this is just because of the weakness in the implementation of WPS allowing an attacker to recover a WPA password in a number of hours.
3. Right Answer: B
Explanation: RFID access cards are copied using a technique by RFID cloning. In corporate facilities and offices, cards are the typical means of authorization checks and while conducting a physical penetration test, they are a particularly valuable technique.
4. Right Answer: C
Explanation: A DoS attack against wireless access points or even cellular signals, is described by using Jamming. Signal jamming is illegal in many countries and jurisdictions. Wireless APs, Cell phone networks, satellite, and other radio communication frequencies make up what is broadly referred to as the EM (Electro Magnetic) spectrum. Many nations treat the EM spectrum as a national resource, the same as their water or airspace, and these countries take great care to ensure it is protected.
5. Right Answer: D
Explanation: Nikto is the best tool as it is a dedicated web application scanning tool. Nmap is a port scanner, while Wireshark is a packet analysis tool.