Deck 8: Communication Media

Full screen (f)
exit full mode
Question
Kismet identifies networks by passively collecting packets, detecting standard named networks, detecting (and given time, decloaking) hidden networks, and inferring the presence of nonbeaconing networks via data traffic.
Use Space or
up arrow
down arrow
to flip the card.
Question
Narrowband communications are data signals that are spread across a wider frequency bandwidth of the radio channel than spread spectrum.
Question
A username is often stored in an unencrypted file or the Windows registry, making it easily accessible to anyone with access to the user's computer.
Question
____ is an iPhone jailbreaking program for Windows that unlocks any SIM card using the anySIM.app.

A) anySIM
B) iNdependence
C) iDemocracy
D) iActivator
Question
____ can restore an iPhone to its read-only state.

A) anySIM
B) iNdependence
C) iDemocracy
D) iActivator
Question
A ____ is a hexadecimal security code that protects Wi-Fi networks.

A) parity bit
B) WEP key
C) checksum
D) service set identifier
Question
All wireless devices that communicate with each other have the same ____.

A) parity bit
B) WEP key
C) checksum
D) service set identifier
Question
Match each item with a statement below:

-PhoneSweep

A) Attackers initiate sequential calls to a block of telephone numbers in order to identify vulnerabilities.
B) Has features that are designed to facilitate covert use, such as a "boss key" that replaces the computer's screen with an incongruous bitmap and ceases all dialing operations.
C) Once installed, it identifies computers running remote access software to bypass the corporate firewall.
D) Tool used for running ICMP ping sweeps.
Question
Match each item with a statement below:

-THC-Scan

A) Attackers initiate sequential calls to a block of telephone numbers in order to identify vulnerabilities.
B) Has features that are designed to facilitate covert use, such as a "boss key" that replaces the computer's screen with an incongruous bitmap and ceases all dialing operations.
C) Once installed, it identifies computers running remote access software to bypass the corporate firewall.
D) Tool used for running ICMP ping sweeps.
Question
Match each item with a statement below:

-Call walking attack

A) Attackers initiate sequential calls to a block of telephone numbers in order to identify vulnerabilities.
B) Has features that are designed to facilitate covert use, such as a "boss key" that replaces the computer's screen with an incongruous bitmap and ceases all dialing operations.
C) Once installed, it identifies computers running remote access software to bypass the corporate firewall.
D) Tool used for running ICMP ping sweeps.
Question
Match each item with a statement below:

-Nessus

A) Attackers initiate sequential calls to a block of telephone numbers in order to identify vulnerabilities.
B) Has features that are designed to facilitate covert use, such as a "boss key" that replaces the computer's screen with an incongruous bitmap and ceases all dialing operations.
C) Once installed, it identifies computers running remote access software to bypass the corporate firewall.
D) Tool used for running ICMP ping sweeps.
Question
What are the steps involved in performing a wireless assessment?
Question
Provide a brief description of each of the following types of antennas: aperture, reflector, monopole, and yagi.
Question
What is the difference between an IKE-Scan and an IKEProbe?
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/14
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 8: Communication Media
1
Kismet identifies networks by passively collecting packets, detecting standard named networks, detecting (and given time, decloaking) hidden networks, and inferring the presence of nonbeaconing networks via data traffic.
True
2
Narrowband communications are data signals that are spread across a wider frequency bandwidth of the radio channel than spread spectrum.
False
3
A username is often stored in an unencrypted file or the Windows registry, making it easily accessible to anyone with access to the user's computer.
True
4
____ is an iPhone jailbreaking program for Windows that unlocks any SIM card using the anySIM.app.

A) anySIM
B) iNdependence
C) iDemocracy
D) iActivator
Unlock Deck
Unlock for access to all 14 flashcards in this deck.
Unlock Deck
k this deck
5
____ can restore an iPhone to its read-only state.

A) anySIM
B) iNdependence
C) iDemocracy
D) iActivator
Unlock Deck
Unlock for access to all 14 flashcards in this deck.
Unlock Deck
k this deck
6
A ____ is a hexadecimal security code that protects Wi-Fi networks.

A) parity bit
B) WEP key
C) checksum
D) service set identifier
Unlock Deck
Unlock for access to all 14 flashcards in this deck.
Unlock Deck
k this deck
7
All wireless devices that communicate with each other have the same ____.

A) parity bit
B) WEP key
C) checksum
D) service set identifier
Unlock Deck
Unlock for access to all 14 flashcards in this deck.
Unlock Deck
k this deck
8
Match each item with a statement below:

-PhoneSweep

A) Attackers initiate sequential calls to a block of telephone numbers in order to identify vulnerabilities.
B) Has features that are designed to facilitate covert use, such as a "boss key" that replaces the computer's screen with an incongruous bitmap and ceases all dialing operations.
C) Once installed, it identifies computers running remote access software to bypass the corporate firewall.
D) Tool used for running ICMP ping sweeps.
Unlock Deck
Unlock for access to all 14 flashcards in this deck.
Unlock Deck
k this deck
9
Match each item with a statement below:

-THC-Scan

A) Attackers initiate sequential calls to a block of telephone numbers in order to identify vulnerabilities.
B) Has features that are designed to facilitate covert use, such as a "boss key" that replaces the computer's screen with an incongruous bitmap and ceases all dialing operations.
C) Once installed, it identifies computers running remote access software to bypass the corporate firewall.
D) Tool used for running ICMP ping sweeps.
Unlock Deck
Unlock for access to all 14 flashcards in this deck.
Unlock Deck
k this deck
10
Match each item with a statement below:

-Call walking attack

A) Attackers initiate sequential calls to a block of telephone numbers in order to identify vulnerabilities.
B) Has features that are designed to facilitate covert use, such as a "boss key" that replaces the computer's screen with an incongruous bitmap and ceases all dialing operations.
C) Once installed, it identifies computers running remote access software to bypass the corporate firewall.
D) Tool used for running ICMP ping sweeps.
Unlock Deck
Unlock for access to all 14 flashcards in this deck.
Unlock Deck
k this deck
11
Match each item with a statement below:

-Nessus

A) Attackers initiate sequential calls to a block of telephone numbers in order to identify vulnerabilities.
B) Has features that are designed to facilitate covert use, such as a "boss key" that replaces the computer's screen with an incongruous bitmap and ceases all dialing operations.
C) Once installed, it identifies computers running remote access software to bypass the corporate firewall.
D) Tool used for running ICMP ping sweeps.
Unlock Deck
Unlock for access to all 14 flashcards in this deck.
Unlock Deck
k this deck
12
What are the steps involved in performing a wireless assessment?
Unlock Deck
Unlock for access to all 14 flashcards in this deck.
Unlock Deck
k this deck
13
Provide a brief description of each of the following types of antennas: aperture, reflector, monopole, and yagi.
Unlock Deck
Unlock for access to all 14 flashcards in this deck.
Unlock Deck
k this deck
14
What is the difference between an IKE-Scan and an IKEProbe?
Unlock Deck
Unlock for access to all 14 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 14 flashcards in this deck.