Deck 7: Telecommunication and Broadband Communication Penetration Testing

Full screen (f)
exit full mode
Question
A(n) ____ is a hardware device or software running on a computer that monitors the network traffic passing through it and denies or allows traffic based on previously defined rules and configurations.

A) router
B) piconet
C) infrared port
D) firewall
Use Space or
up arrow
down arrow
to flip the card.
Question
The term ____ refers to software that extends the capabilities of the browser (e.g., the ability to download and display video, hear audio, or play animations).

A) browser plug-in
B) router
C) cookie
D) firewall
Question
The term ____ refers to a technology developed by Microsoft that allows software applets to be reused in various applications.

A) java
B) ActiveX
C) Spyware
D) Service set identifier
Question
The term ____ refers to a piece of information sent by a Web site to the browser when the site is accessed.

A) cache
B) buffer
C) cookie
D) browser plug-in
Question
The term ____ refers to stealthy computer monitoring software that allows an attacker to secretly record all activities of a targeted user over the network.

A) spyware
B) broadband
C) Bluetooth
D) DSL
Question
Monitoring telephone and Internet communications without the knowledge of the target is called ____.

A) wiretapping
B) pairing
C) stack fingerprinting
D) wardriving
Question
____ is the act of locating and possibly exploiting connections to wireless local area networks while driving around a geographic location.

A) Wiretapping
B) Wardriving
C) Stack fingerprinting
D) Pairing
Question
A(n) ____ is a network tunneled through other networks, dedicated to specific communications.

A) virtual private network
B) storage area network
C) metropolitan area network
D) local area network
Question
____ is a security protocol used in many wireless local area networks.

A) SNMP
B) SMTP
C) WEP
D) SSID
Question
The term ____ refers to the sequence of characters that is attached to each packet transmitted on a wireless network and identifies that network.

A) parity bit
B) WEP key
C) checksum
D) service set identifier
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/10
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 7: Telecommunication and Broadband Communication Penetration Testing
1
A(n) ____ is a hardware device or software running on a computer that monitors the network traffic passing through it and denies or allows traffic based on previously defined rules and configurations.

A) router
B) piconet
C) infrared port
D) firewall
firewall
2
The term ____ refers to software that extends the capabilities of the browser (e.g., the ability to download and display video, hear audio, or play animations).

A) browser plug-in
B) router
C) cookie
D) firewall
browser plug-in
3
The term ____ refers to a technology developed by Microsoft that allows software applets to be reused in various applications.

A) java
B) ActiveX
C) Spyware
D) Service set identifier
ActiveX
4
The term ____ refers to a piece of information sent by a Web site to the browser when the site is accessed.

A) cache
B) buffer
C) cookie
D) browser plug-in
Unlock Deck
Unlock for access to all 10 flashcards in this deck.
Unlock Deck
k this deck
5
The term ____ refers to stealthy computer monitoring software that allows an attacker to secretly record all activities of a targeted user over the network.

A) spyware
B) broadband
C) Bluetooth
D) DSL
Unlock Deck
Unlock for access to all 10 flashcards in this deck.
Unlock Deck
k this deck
6
Monitoring telephone and Internet communications without the knowledge of the target is called ____.

A) wiretapping
B) pairing
C) stack fingerprinting
D) wardriving
Unlock Deck
Unlock for access to all 10 flashcards in this deck.
Unlock Deck
k this deck
7
____ is the act of locating and possibly exploiting connections to wireless local area networks while driving around a geographic location.

A) Wiretapping
B) Wardriving
C) Stack fingerprinting
D) Pairing
Unlock Deck
Unlock for access to all 10 flashcards in this deck.
Unlock Deck
k this deck
8
A(n) ____ is a network tunneled through other networks, dedicated to specific communications.

A) virtual private network
B) storage area network
C) metropolitan area network
D) local area network
Unlock Deck
Unlock for access to all 10 flashcards in this deck.
Unlock Deck
k this deck
9
____ is a security protocol used in many wireless local area networks.

A) SNMP
B) SMTP
C) WEP
D) SSID
Unlock Deck
Unlock for access to all 10 flashcards in this deck.
Unlock Deck
k this deck
10
The term ____ refers to the sequence of characters that is attached to each packet transmitted on a wireless network and identifies that network.

A) parity bit
B) WEP key
C) checksum
D) service set identifier
Unlock Deck
Unlock for access to all 10 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 10 flashcards in this deck.