Certified Ethical Hacker (CEH) Practice Question

While monitoring a corporate WLAN, you see a flood of 802.11 deauthentication frames whose transmitter address does not match any authorized AP. Seconds later, clients reconnect and a 4-way handshake is exchanged. What wireless threat does this activity most likely represent?

  • A deauthentication attack that forces WPA/WPA2 clients to reconnect so the 4-way handshake can be captured for offline cracking

  • A CTS flood that abuses virtual carrier sensing to silence stations and create a denial-of-service condition

  • A KRACK key-reinstallation attack aimed at decrypting traffic by replaying handshake messages

  • A beacon flood that advertises thousands of fake SSIDs to exhaust client resources and confuse users

Certified Ethical Hacker (CEH)
Wireless Network Hacking
Your Score:
Settings & Objectives
Random Mixed
Questions are selected randomly from all chosen topics, with a preference for those you haven’t seen before. You may see several questions from the same objective or domain in a row.
Rotate by Objective
Questions cycle through each objective or domain in turn, helping you avoid long streaks of questions from the same area. You may see some repeat questions, but the distribution will be more balanced across topics.

Check or uncheck an objective to set which questions you will receive.

Bash, the Crucial Exams Chat Bot
AI Bot