Deck 7: Telecommunication and Broadband Communication Penetration Testing
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/10
Play
Full screen (f)
Deck 7: Telecommunication and Broadband Communication Penetration Testing
1
A(n) ____ is a hardware device or software running on a computer that monitors the network traffic passing through it and denies or allows traffic based on previously defined rules and configurations.
A) router
B) piconet
C) infrared port
D) firewall
A) router
B) piconet
C) infrared port
D) firewall
firewall
2
The term ____ refers to software that extends the capabilities of the browser (e.g., the ability to download and display video, hear audio, or play animations).
A) browser plug-in
B) router
C) cookie
D) firewall
A) browser plug-in
B) router
C) cookie
D) firewall
browser plug-in
3
The term ____ refers to a technology developed by Microsoft that allows software applets to be reused in various applications.
A) java
B) ActiveX
C) Spyware
D) Service set identifier
A) java
B) ActiveX
C) Spyware
D) Service set identifier
ActiveX
4
The term ____ refers to a piece of information sent by a Web site to the browser when the site is accessed.
A) cache
B) buffer
C) cookie
D) browser plug-in
A) cache
B) buffer
C) cookie
D) browser plug-in
Unlock Deck
Unlock for access to all 10 flashcards in this deck.
Unlock Deck
k this deck
5
The term ____ refers to stealthy computer monitoring software that allows an attacker to secretly record all activities of a targeted user over the network.
A) spyware
B) broadband
C) Bluetooth
D) DSL
A) spyware
B) broadband
C) Bluetooth
D) DSL
Unlock Deck
Unlock for access to all 10 flashcards in this deck.
Unlock Deck
k this deck
6
Monitoring telephone and Internet communications without the knowledge of the target is called ____.
A) wiretapping
B) pairing
C) stack fingerprinting
D) wardriving
A) wiretapping
B) pairing
C) stack fingerprinting
D) wardriving
Unlock Deck
Unlock for access to all 10 flashcards in this deck.
Unlock Deck
k this deck
7
____ is the act of locating and possibly exploiting connections to wireless local area networks while driving around a geographic location.
A) Wiretapping
B) Wardriving
C) Stack fingerprinting
D) Pairing
A) Wiretapping
B) Wardriving
C) Stack fingerprinting
D) Pairing
Unlock Deck
Unlock for access to all 10 flashcards in this deck.
Unlock Deck
k this deck
8
A(n) ____ is a network tunneled through other networks, dedicated to specific communications.
A) virtual private network
B) storage area network
C) metropolitan area network
D) local area network
A) virtual private network
B) storage area network
C) metropolitan area network
D) local area network
Unlock Deck
Unlock for access to all 10 flashcards in this deck.
Unlock Deck
k this deck
9
____ is a security protocol used in many wireless local area networks.
A) SNMP
B) SMTP
C) WEP
D) SSID
A) SNMP
B) SMTP
C) WEP
D) SSID
Unlock Deck
Unlock for access to all 10 flashcards in this deck.
Unlock Deck
k this deck
10
The term ____ refers to the sequence of characters that is attached to each packet transmitted on a wireless network and identifies that network.
A) parity bit
B) WEP key
C) checksum
D) service set identifier
A) parity bit
B) WEP key
C) checksum
D) service set identifier
Unlock Deck
Unlock for access to all 10 flashcards in this deck.
Unlock Deck
k this deck