Exam 3: Passive Wireless Discovery
Passive wireless discovery through wardriving is in itself an illegal activity.
False
Describe two examples of social engineering attacks.
Consider the following examples:
* Maria is a customer service representative who receives a telephone call from someone claiming to be a client. This person has a thick accent that makes his speech difficult to understand. Maria asks him to respond to a series of ID authentication questions to ensure that he is an approved client. However, when asked a question, the caller mumbles his response so that Maria cannot understand him. Too embarrassed to keep asking him to repeat his answer, Maria finally provides him with the password.
* The help desk at a large corporation is overwhelmed by the number of telephone calls it receives after a virus attack. Ari is a help desk technician and receives a frantic call from a user who identifies himself as Frank, a company vice president. Frank says that an office assistant has been unable to complete and send him a critical report because of the virus and is now going home sick. Frank must have that office assistant's network password so he can finish the report, which is due by the end of the day. Because Ari is worn out from the virus attack and has more calls coming in, he looks up the password and gives it to Frank. Ari does not know that Frank is not an employee,but an outsider who now can easily access the company's computer system.
Most phishing sites only function for three to five days to prevent law enforcement agencies from tracking the attackers.
True
The first two versions of SNMP, SNMPv1 and SNMPv2, used ____ that acted like a password to allow or deny access to the information that was collected.
At regular intervals (normally every 100 ms) the wireless access point sends a beacon frame to announce its presence and to provide the necessary information for devices that want to join the network. This process is known as ____.
The GPS receiver can deduce its own location based on a mathematical principle called ____________________.
____ is a type of solid-state (microchip) technology in which there are no moving parts.
The smallest mobile computing device is a(n) ____________________.
What are some of the techniques used by wardrivers to locate RF signals?
____ relies on tricking and deceiving someone to access a system.
The informal expression used more often for searching for RF signals is ____.
A(n) ____ PC is small enough to be held in a single hand yet has many of the features of a laptop computer.
NetStumbler can capture and decode wireless packets, monitor utilization, or make automatic connections to networks it discovers.
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)