Exam 4: Active Wireless Attacks
Exam 1: Foundations of Wireless Security42 Questions
Exam 2: Wireless LAN Vulnerabilities42 Questions
Exam 3: Passive Wireless Discovery42 Questions
Exam 4: Active Wireless Attacks42 Questions
Exam 5: Wireless Security Models42 Questions
Exam 6: Enterprise Wireless Hardware Security42 Questions
Exam 7: Designing a Secure Wireless Network42 Questions
Exam 8: Secure Wireless Authentication42 Questions
Exam 9: Secure Wireless Transmissions42 Questions
Exam 10: Managing the Wireless Network42 Questions
Exam 11: Wireless Security Policy42 Questions
Exam 12: Operational Support and Wireless Convergence42 Questions
Select questions type
Because the wireless medium is shared among all devices, there must be rules for cooperation among the wireless devices. The 802.11 standard uses a procedure known as ____.
Free
(Multiple Choice)
4.7/5
(33)
Correct Answer:
C
Logic bombs are easy to detect before they are triggered.
Free
(True/False)
4.9/5
(36)
Correct Answer:
False
____ attacks flood the RF spectrum with enough radiomagnetic interference to prevent a device from effectively communicating with the AP.
Free
(Multiple Choice)
4.7/5
(34)
Correct Answer:
A
____ typically displays advertising banners or pop-up ads and is frequently encountered while visiting Web sites with a browser.
(Multiple Choice)
4.8/5
(31)
Once an attacker's wireless device has entered the network and focused its attacks at other similar devices this is known as a(n) ____________________.
(Short Answer)
4.9/5
(28)
Briefly describe the Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) procedure.
(Essay)
4.9/5
(37)
____ allows the Windows operating system to automatically detect new hardware when it is installed on a computer.
(Multiple Choice)
4.9/5
(48)
In technical terms, ____ describes the points of risk regarding the penetration of a security defense.
(Multiple Choice)
4.8/5
(28)
A(n) ____________________ may be defined as a weakness or flaw in an information system that could be exploited to cause harm.
(Short Answer)
4.7/5
(28)
A ____ attack is designed to prevent a device from performing its intended function.
(Multiple Choice)
4.8/5
(28)
The ____ is a popular protocol used to manage networked equipment.
(Multiple Choice)
4.9/5
(41)
A ____ bypasses all of the network security and opens the entire network and all users to direct attacks.
(Multiple Choice)
4.8/5
(30)
What are some of the symptoms that indicate a virus has infected a computer?
(Essay)
4.8/5
(32)
What are the security problems related to supporting remote access in wireless gateways?
(Essay)
4.9/5
(35)
____ occurs when an individual uses the personal information of someone else to impersonate that individual with the intent to commit fraud or other crimes.
(Multiple Choice)
4.8/5
(33)
A ____ is a computer program that lies dormant until it is triggered by a specific event.
(Multiple Choice)
4.8/5
(33)
____ attacks are designed to deny wireless devices access to the access point itself.
(Multiple Choice)
4.7/5
(28)
Showing 1 - 20 of 42
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)