Exam 8: Communication Media

arrow
  • Select Tags
search iconSearch Question
  • Select Tags

Match each item with a statement below: -Call walking attack

Free
(Multiple Choice)
4.8/5
(48)
Correct Answer:
Verified

A

Narrowband communications are data signals that are spread across a wider frequency bandwidth of the radio channel than spread spectrum.

Free
(True/False)
4.9/5
(38)
Correct Answer:
Verified

False

What is the difference between an IKE-Scan and an IKEProbe?

Free
(Essay)
4.9/5
(31)
Correct Answer:
Verified

IKE-Scan is a command-line tool that uses the IKE protocol to discover, fingerprint, and test IPSec VPN servers. It supports preshared key cracking in IKE aggressive mode using preshared key authentication.
IKEProbe can be used to determine the vulnerabilities in the preshared key implementation of VPN servers. By using different combinations of ciphers, hashes, and Diffie-Hellman groups, it attempts to force the server into aggressive mode.

What are the steps involved in performing a wireless assessment?

(Essay)
4.7/5
(22)

Provide a brief description of each of the following types of antennas: aperture, reflector, monopole, and yagi.

(Essay)
4.9/5
(34)

A ____ is a hexadecimal security code that protects Wi-Fi networks.

(Multiple Choice)
4.8/5
(34)

Match each item with a statement below: -Nessus

(Multiple Choice)
4.8/5
(29)

____ is an iPhone jailbreaking program for Windows that unlocks any SIM card using the anySIM.app.

(Multiple Choice)
4.8/5
(31)

Match each item with a statement below: -THC-Scan

(Multiple Choice)
4.9/5
(31)

Kismet identifies networks by passively collecting packets, detecting standard named networks, detecting (and given time, decloaking) hidden networks, and inferring the presence of nonbeaconing networks via data traffic.

(True/False)
4.9/5
(39)

Match each item with a statement below: -PhoneSweep

(Multiple Choice)
4.8/5
(28)

A username is often stored in an unencrypted file or the Windows registry, making it easily accessible to anyone with access to the user's computer.

(True/False)
4.9/5
(35)

All wireless devices that communicate with each other have the same ____.

(Multiple Choice)
4.7/5
(37)

____ can restore an iPhone to its read-only state.

(Multiple Choice)
4.8/5
(32)
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)