Exam 4: Active Wireless Attacks

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

With wireless CSMA/CA the amount of time that a device must wait after the medium is clear is called the ____________________.

(Short Answer)
4.8/5
(35)

In a ____ attack, an attacker attempts to create every possible password combination by systematically changing one character at a time in a password.

(Multiple Choice)
4.9/5
(39)

The Anti-Spyware Coalition defines ____________________ as technologies that are implemented in ways that impair a user's control over the use of system resources.

(Short Answer)
4.9/5
(39)

Before users can be given access to a computer and its data, they must in some way prove that they are who they claim to be. This process of providing proof is known as ____.

(Multiple Choice)
4.8/5
(23)

DoS attacks are rare against wired network servers.

(True/False)
4.9/5
(42)

Most successful wireless DoS attacks are performed at the ____ layer of the OSI model.

(Multiple Choice)
4.7/5
(37)

Authentication can be performed based on what you have, what you know, or what you are.

(True/False)
4.8/5
(36)
Match each item with an statement below:
determines the number of unique new passwords a user must use before an old password can be reused.
Password history
a secret combination of letters and numbers that serves to validate or authenticate a user by what he knows.
Password
unsolicited e-mail.
Malware
Correct Answer:
Verified
Premises:
Responses:
determines the number of unique new passwords a user must use before an old password can be reused.
Password history
a secret combination of letters and numbers that serves to validate or authenticate a user by what he knows.
Password
unsolicited e-mail.
Malware
term used to describe computer programs designed to break into and create havoc on portable or desktop computers.
Spam
attempts to prevent multiple wireless devices from transmitting at the same time.
CAN-SPAM
how many days a password can be used before the user is required to change it.
Adware
U.S. law against spam.
CSMA/CA
determines how many days a user must keep new passwords before they can change them.
Minimum password age
software that delivers advertising content in a manner or context that is unexpected and unwanted by the user.
Maximum password age
(Matching)
4.9/5
(40)

In a ____ attack, each word from a dictionary is encoded in the same way the computer encodes a user's password for protection. Attackers then compare the encoded dictionary words against those in the encoded password file.

(Multiple Choice)
4.9/5
(21)

With explicit ____, an acknowledgment frame (abbreviated ACK) is sent by the receiving device back to the sending device to confirm that the data frame arrived intact.

(Multiple Choice)
4.7/5
(31)

One of the spyware tools often used is ____.

(Multiple Choice)
4.8/5
(43)

What are some of the characteristics of weak passwords?

(Essay)
4.8/5
(35)

Briefly explain the password paradox.

(Essay)
4.7/5
(34)

Briefly describe how to perform a wired network DoS attack.

(Essay)
4.9/5
(45)

____ is a general term used to describe software that violates a user's personal security.

(Multiple Choice)
4.9/5
(32)

____ is a service that allows devices on a network to discover other devices and determine how to work with them.

(Multiple Choice)
4.9/5
(31)

An incorrect configuration of wireless hardware or software can often result in easy access to a system.

(True/False)
4.9/5
(37)

____________________ are devices that combine access point, router, and network address translation features.

(Short Answer)
4.7/5
(33)

A ____ program creates fake packets and flood the wireless network.

(Multiple Choice)
4.8/5
(40)

A computer ____ is a program that secretly attaches itself to another document or program and executes when that document or program is opened.

(Multiple Choice)
4.8/5
(30)
Showing 21 - 40 of 42
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)