Deck 8: Communication Media
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/14
Play
Full screen (f)
Deck 8: Communication Media
1
Kismet identifies networks by passively collecting packets, detecting standard named networks, detecting (and given time, decloaking) hidden networks, and inferring the presence of nonbeaconing networks via data traffic.
True
2
Narrowband communications are data signals that are spread across a wider frequency bandwidth of the radio channel than spread spectrum.
False
3
A username is often stored in an unencrypted file or the Windows registry, making it easily accessible to anyone with access to the user's computer.
True
4
____ is an iPhone jailbreaking program for Windows that unlocks any SIM card using the anySIM.app.
A) anySIM
B) iNdependence
C) iDemocracy
D) iActivator
A) anySIM
B) iNdependence
C) iDemocracy
D) iActivator
Unlock Deck
Unlock for access to all 14 flashcards in this deck.
Unlock Deck
k this deck
5
____ can restore an iPhone to its read-only state.
A) anySIM
B) iNdependence
C) iDemocracy
D) iActivator
A) anySIM
B) iNdependence
C) iDemocracy
D) iActivator
Unlock Deck
Unlock for access to all 14 flashcards in this deck.
Unlock Deck
k this deck
6
A ____ is a hexadecimal security code that protects Wi-Fi networks.
A) parity bit
B) WEP key
C) checksum
D) service set identifier
A) parity bit
B) WEP key
C) checksum
D) service set identifier
Unlock Deck
Unlock for access to all 14 flashcards in this deck.
Unlock Deck
k this deck
7
All wireless devices that communicate with each other have the same ____.
A) parity bit
B) WEP key
C) checksum
D) service set identifier
A) parity bit
B) WEP key
C) checksum
D) service set identifier
Unlock Deck
Unlock for access to all 14 flashcards in this deck.
Unlock Deck
k this deck
8
Match each item with a statement below:
-PhoneSweep
A) Attackers initiate sequential calls to a block of telephone numbers in order to identify vulnerabilities.
B) Has features that are designed to facilitate covert use, such as a "boss key" that replaces the computer's screen with an incongruous bitmap and ceases all dialing operations.
C) Once installed, it identifies computers running remote access software to bypass the corporate firewall.
D) Tool used for running ICMP ping sweeps.
-PhoneSweep
A) Attackers initiate sequential calls to a block of telephone numbers in order to identify vulnerabilities.
B) Has features that are designed to facilitate covert use, such as a "boss key" that replaces the computer's screen with an incongruous bitmap and ceases all dialing operations.
C) Once installed, it identifies computers running remote access software to bypass the corporate firewall.
D) Tool used for running ICMP ping sweeps.
Unlock Deck
Unlock for access to all 14 flashcards in this deck.
Unlock Deck
k this deck
9
Match each item with a statement below:
-THC-Scan
A) Attackers initiate sequential calls to a block of telephone numbers in order to identify vulnerabilities.
B) Has features that are designed to facilitate covert use, such as a "boss key" that replaces the computer's screen with an incongruous bitmap and ceases all dialing operations.
C) Once installed, it identifies computers running remote access software to bypass the corporate firewall.
D) Tool used for running ICMP ping sweeps.
-THC-Scan
A) Attackers initiate sequential calls to a block of telephone numbers in order to identify vulnerabilities.
B) Has features that are designed to facilitate covert use, such as a "boss key" that replaces the computer's screen with an incongruous bitmap and ceases all dialing operations.
C) Once installed, it identifies computers running remote access software to bypass the corporate firewall.
D) Tool used for running ICMP ping sweeps.
Unlock Deck
Unlock for access to all 14 flashcards in this deck.
Unlock Deck
k this deck
10
Match each item with a statement below:
-Call walking attack
A) Attackers initiate sequential calls to a block of telephone numbers in order to identify vulnerabilities.
B) Has features that are designed to facilitate covert use, such as a "boss key" that replaces the computer's screen with an incongruous bitmap and ceases all dialing operations.
C) Once installed, it identifies computers running remote access software to bypass the corporate firewall.
D) Tool used for running ICMP ping sweeps.
-Call walking attack
A) Attackers initiate sequential calls to a block of telephone numbers in order to identify vulnerabilities.
B) Has features that are designed to facilitate covert use, such as a "boss key" that replaces the computer's screen with an incongruous bitmap and ceases all dialing operations.
C) Once installed, it identifies computers running remote access software to bypass the corporate firewall.
D) Tool used for running ICMP ping sweeps.
Unlock Deck
Unlock for access to all 14 flashcards in this deck.
Unlock Deck
k this deck
11
Match each item with a statement below:
-Nessus
A) Attackers initiate sequential calls to a block of telephone numbers in order to identify vulnerabilities.
B) Has features that are designed to facilitate covert use, such as a "boss key" that replaces the computer's screen with an incongruous bitmap and ceases all dialing operations.
C) Once installed, it identifies computers running remote access software to bypass the corporate firewall.
D) Tool used for running ICMP ping sweeps.
-Nessus
A) Attackers initiate sequential calls to a block of telephone numbers in order to identify vulnerabilities.
B) Has features that are designed to facilitate covert use, such as a "boss key" that replaces the computer's screen with an incongruous bitmap and ceases all dialing operations.
C) Once installed, it identifies computers running remote access software to bypass the corporate firewall.
D) Tool used for running ICMP ping sweeps.
Unlock Deck
Unlock for access to all 14 flashcards in this deck.
Unlock Deck
k this deck
12
What are the steps involved in performing a wireless assessment?
Unlock Deck
Unlock for access to all 14 flashcards in this deck.
Unlock Deck
k this deck
13
Provide a brief description of each of the following types of antennas: aperture, reflector, monopole, and yagi.
Unlock Deck
Unlock for access to all 14 flashcards in this deck.
Unlock Deck
k this deck
14
What is the difference between an IKE-Scan and an IKEProbe?
Unlock Deck
Unlock for access to all 14 flashcards in this deck.
Unlock Deck
k this deck