Exam 3: Passive Wireless Discovery

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Passive wireless discovery through wardriving is in itself an illegal activity.

Free
(True/False)
4.9/5
(37)
Correct Answer:
Verified

False

Describe two examples of social engineering attacks.

Free
(Essay)
4.9/5
(32)
Correct Answer:
Verified

Consider the following examples:
* Maria is a customer service representative who receives a telephone call from someone claiming to be a client. This person has a thick accent that makes his speech difficult to understand. Maria asks him to respond to a series of ID authentication questions to ensure that he is an approved client. However, when asked a question, the caller mumbles his response so that Maria cannot understand him. Too embarrassed to keep asking him to repeat his answer, Maria finally provides him with the password.
* The help desk at a large corporation is overwhelmed by the number of telephone calls it receives after a virus attack. Ari is a help desk technician and receives a frantic call from a user who identifies himself as Frank, a company vice president. Frank says that an office assistant has been unable to complete and send him a critical report because of the virus and is now going home sick. Frank must have that office assistant's network password so he can finish the report, which is due by the end of the day. Because Ari is worn out from the virus attack and has more calls coming in, he looks up the password and gives it to Frank. Ari does not know that Frank is not an employee,but an outsider who now can easily access the company's computer system.

Most phishing sites only function for three to five days to prevent law enforcement agencies from tracking the attackers.

Free
(True/False)
4.8/5
(37)
Correct Answer:
Verified

True

Briefly describe a packet sniffer.

(Essay)
4.8/5
(29)

The first two versions of SNMP, SNMPv1 and SNMPv2, used ____ that acted like a password to allow or deny access to the information that was collected.

(Multiple Choice)
4.9/5
(33)

At regular intervals (normally every 100 ms) the wireless access point sends a beacon frame to announce its presence and to provide the necessary information for devices that want to join the network. This process is known as ____.

(Multiple Choice)
4.8/5
(43)

____ is a passive method of receiving WLAN signals.

(Multiple Choice)
4.7/5
(32)

The GPS receiver can deduce its own location based on a mathematical principle called ____________________.

(Short Answer)
4.7/5
(36)

____ is a type of solid-state (microchip) technology in which there are no moving parts.

(Multiple Choice)
4.9/5
(33)

The smallest mobile computing device is a(n) ____________________.

(Short Answer)
4.8/5
(30)
Match each item with an statement below:
group of integrated circuits that provide the functionality of the wireless NIC.
Dumpster diving
communicates with the software agents on each network device and collects the data stored in the MIBs.
Handheld PC
detects signals from all directions equally.
SNMP management station
Correct Answer:
Verified
Premises:
Responses:
group of integrated circuits that provide the functionality of the wireless NIC.
Dumpster diving
communicates with the software agents on each network device and collects the data stored in the MIBs.
Handheld PC
detects signals from all directions equally.
SNMP management station
set of protocols developed to support the secure exchange of packets.
Wireless Zero Configuration (WZC)
looking through large (usually outdoor) trash receptacles.
Phishing
designed to provide the familiar applications from a desktop computer in a mobile format.
Mini PCI
integrated operating system tool for a Windows-based computer.
Chipset
small card that is functionally equivalent to a standard PCI expansion card.
Omni-directional antenna
an electronic version of social engineering.
IPSec
(Matching)
5.0/5
(41)

____ targets only specific users.

(Multiple Choice)
4.8/5
(38)

Briefly describe the main characteristics of a tablet computer.

(Essay)
4.8/5
(39)

What are the main characteristics of WLAN client utilities?

(Essay)
4.9/5
(35)

What are some of the techniques used by wardrivers to locate RF signals?

(Essay)
4.8/5
(37)

____ relies on tricking and deceiving someone to access a system.

(Multiple Choice)
4.9/5
(38)

What are the two fundamental characteristics of antennas?

(Essay)
4.8/5
(30)

The informal expression used more often for searching for RF signals is ____.

(Multiple Choice)
4.8/5
(30)

A(n) ____ PC is small enough to be held in a single hand yet has many of the features of a laptop computer.

(Multiple Choice)
4.9/5
(39)

NetStumbler can capture and decode wireless packets, monitor utilization, or make automatic connections to networks it discovers.

(True/False)
4.7/5
(41)
Showing 1 - 20 of 42
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)