Exam 4: Active Wireless Attacks
Exam 1: Foundations of Wireless Security42 Questions
Exam 2: Wireless LAN Vulnerabilities42 Questions
Exam 3: Passive Wireless Discovery42 Questions
Exam 4: Active Wireless Attacks42 Questions
Exam 5: Wireless Security Models42 Questions
Exam 6: Enterprise Wireless Hardware Security42 Questions
Exam 7: Designing a Secure Wireless Network42 Questions
Exam 8: Secure Wireless Authentication42 Questions
Exam 9: Secure Wireless Transmissions42 Questions
Exam 10: Managing the Wireless Network42 Questions
Exam 11: Wireless Security Policy42 Questions
Exam 12: Operational Support and Wireless Convergence42 Questions
Select questions type
With wireless CSMA/CA the amount of time that a device must wait after the medium is clear is called the ____________________.
(Short Answer)
4.8/5
(35)
In a ____ attack, an attacker attempts to create every possible password combination by systematically changing one character at a time in a password.
(Multiple Choice)
4.9/5
(39)
The Anti-Spyware Coalition defines ____________________ as technologies that are implemented in ways that impair a user's control over the use of system resources.
(Short Answer)
4.9/5
(39)
Before users can be given access to a computer and its data, they must in some way prove that they are who they claim to be. This process of providing proof is known as ____.
(Multiple Choice)
4.8/5
(23)
Most successful wireless DoS attacks are performed at the ____ layer of the OSI model.
(Multiple Choice)
4.7/5
(37)
Authentication can be performed based on what you have, what you know, or what you are.
(True/False)
4.8/5
(36)
Match each item with an statement below:
Correct Answer:
Premises:
Responses:
(Matching)
4.9/5
(40)
In a ____ attack, each word from a dictionary is encoded in the same way the computer encodes a user's password for protection. Attackers then compare the encoded dictionary words against those in the encoded password file.
(Multiple Choice)
4.9/5
(21)
With explicit ____, an acknowledgment frame (abbreviated ACK) is sent by the receiving device back to the sending device to confirm that the data frame arrived intact.
(Multiple Choice)
4.7/5
(31)
____ is a general term used to describe software that violates a user's personal security.
(Multiple Choice)
4.9/5
(32)
____ is a service that allows devices on a network to discover other devices and determine how to work with them.
(Multiple Choice)
4.9/5
(31)
An incorrect configuration of wireless hardware or software can often result in easy access to a system.
(True/False)
4.9/5
(37)
____________________ are devices that combine access point, router, and network address translation features.
(Short Answer)
4.7/5
(33)
A ____ program creates fake packets and flood the wireless network.
(Multiple Choice)
4.8/5
(40)
A computer ____ is a program that secretly attaches itself to another document or program and executes when that document or program is opened.
(Multiple Choice)
4.8/5
(30)
Showing 21 - 40 of 42
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)