Exam 4: Active Wireless Attacks

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Because the wireless medium is shared among all devices, there must be rules for cooperation among the wireless devices. The 802.11 standard uses a procedure known as ____.

Free
(Multiple Choice)
4.7/5
(33)
Correct Answer:
Verified

C

Logic bombs are easy to detect before they are triggered.

Free
(True/False)
4.9/5
(36)
Correct Answer:
Verified

False

____ attacks flood the RF spectrum with enough radiomagnetic interference to prevent a device from effectively communicating with the AP.

Free
(Multiple Choice)
4.7/5
(34)
Correct Answer:
Verified

A

____ typically displays advertising banners or pop-up ads and is frequently encountered while visiting Web sites with a browser.

(Multiple Choice)
4.8/5
(31)

Once an attacker's wireless device has entered the network and focused its attacks at other similar devices this is known as a(n) ____________________.

(Short Answer)
4.9/5
(28)

Briefly describe the Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) procedure.

(Essay)
4.9/5
(37)

____ allows the Windows operating system to automatically detect new hardware when it is installed on a computer.

(Multiple Choice)
4.9/5
(48)

In technical terms, ____ describes the points of risk regarding the penetration of a security defense.

(Multiple Choice)
4.8/5
(28)

A(n) ____________________ may be defined as a weakness or flaw in an information system that could be exploited to cause harm.

(Short Answer)
4.7/5
(28)

A ____ attack is designed to prevent a device from performing its intended function.

(Multiple Choice)
4.8/5
(28)

The ____ is a popular protocol used to manage networked equipment.

(Multiple Choice)
4.9/5
(41)

A ____ bypasses all of the network security and opens the entire network and all users to direct attacks.

(Multiple Choice)
4.8/5
(30)

What are some of the symptoms that indicate a virus has infected a computer?

(Essay)
4.8/5
(32)

What are the security problems related to supporting remote access in wireless gateways?

(Essay)
4.9/5
(35)

What are the minimum criteria for creating good passwords?

(Essay)
4.7/5
(37)

____ occurs when an individual uses the personal information of someone else to impersonate that individual with the intent to commit fraud or other crimes.

(Multiple Choice)
4.8/5
(33)

A ____ is a computer program that lies dormant until it is triggered by a specific event.

(Multiple Choice)
4.8/5
(33)

What are the problems with using default passwords?

(Essay)
4.8/5
(34)

____ attacks are designed to deny wireless devices access to the access point itself.

(Multiple Choice)
4.7/5
(28)

What are the problems of using community strings in SNMP?

(Essay)
4.8/5
(35)
Showing 1 - 20 of 42
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)