Deck 3: Passive Wireless Discovery
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Match between columns
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/42
Play
Full screen (f)
Deck 3: Passive Wireless Discovery
1
Passive wireless discovery through wardriving is in itself an illegal activity.
False
2
____ relies on tricking and deceiving someone to access a system.
A) Social engineering
B) Wardriving
C) Warchalking
D) Wireless site mapping
A) Social engineering
B) Wardriving
C) Warchalking
D) Wireless site mapping
A
3
____ is a version of NetStumbler that runs on handheld devices.
A) KisMAC
B) MiniStumbler
C) AiroPeek
D) Kismet
A) KisMAC
B) MiniStumbler
C) AiroPeek
D) Kismet
B
4
The informal expression used more often for searching for RF signals is ____.
A) phishing
B) pharming
C) beaconing
D) wardriving
A) phishing
B) pharming
C) beaconing
D) wardriving
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
5
NetStumbler can capture and decode wireless packets, monitor utilization, or make automatic connections to networks it discovers.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
6
Instead of asking the user to visit a fraudulent Web site, ____ automatically redirects the user to the fake site.
A) spear phishing
B) phishing
C) pharming
D) Google phishing
A) spear phishing
B) phishing
C) pharming
D) Google phishing
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
7
____ is a type of solid-state (microchip) technology in which there are no moving parts.
A) Flash memory
B) Sled
C) Mini PCI
D) Type II PC card
A) Flash memory
B) Sled
C) Mini PCI
D) Type II PC card
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
8
____ is a passive method of receiving WLAN signals.
A) CDMA
B) RFMON
C) SDIO NOW!
D) Sled
A) CDMA
B) RFMON
C) SDIO NOW!
D) Sled
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
9
The hardware that allows the mobile computing device to detect a wireless signal is a(n) ____.
A) access point card
B) CompactFlash card
C) flash memory
D) wireless network interface card
A) access point card
B) CompactFlash card
C) flash memory
D) wireless network interface card
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
10
Most phishing sites only function for three to five days to prevent law enforcement agencies from tracking the attackers.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
11
Many of the functions of a PDA are now incorporated into cellular telephones sometimes called ____.
A) smartphones
B) handheld PCs
C) tablet computers
D) slate computers
A) smartphones
B) handheld PCs
C) tablet computers
D) slate computers
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
12
____ targets only specific users.
A) Google pharming
B) Spear phishing
C) Pharming
D) Google phishing
A) Google pharming
B) Spear phishing
C) Pharming
D) Google phishing
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
13
A significant advantage of using PDAs is their ability to synchronize data with another computer.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
14
____ involves sending an e-mail or displaying a Web announcement that falsely claims to be from a legitimate enterprise in an attempt to trick the user into surrendering information.
A) Wardriving
B) Dumpster diving
C) Warchalking
D) Phishing
A) Wardriving
B) Dumpster diving
C) Warchalking
D) Phishing
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
15
____ antennas send a narrowly focused signal beam.
A) Cyclic directional
B) Omni-directional
C) Semi-directional
D) Highly directional
A) Cyclic directional
B) Omni-directional
C) Semi-directional
D) Highly directional
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
16
A(n) ____ PC is small enough to be held in a single hand yet has many of the features of a laptop computer.
A) PCMCIA
B) Tablet
C) handheld
D) slate
A) PCMCIA
B) Tablet
C) handheld
D) slate
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
17
At regular intervals (normally every 100 ms) the wireless access point sends a beacon frame to announce its presence and to provide the necessary information for devices that want to join the network. This process is known as ____.
A) phishing
B) beaconing
C) pharming
D) mapping
A) phishing
B) beaconing
C) pharming
D) mapping
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
18
Wardriving software that is specifically designed to pick up a radio frequency WLAN signal is known as a ____.
A) sled
B) client utility
C) freeware discovery application
D) WZC
A) sled
B) client utility
C) freeware discovery application
D) WZC
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
19
A(n) ____ antenna focuses the energy in one direction.
A) cyclic directional
B) omni-directional
C) semi-directional
D) highly directional
A) cyclic directional
B) omni-directional
C) semi-directional
D) highly directional
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
20
Promiscuous mode will not work on a WLAN.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
21
Known as ____, these attackers lack the technical skills of more advanced users and are sometimes considered more dangerous.
A) hackers
B) script kiddies
C) crackers
D) warchalkers
A) hackers
B) script kiddies
C) crackers
D) warchalkers
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
22
What are some of the techniques used by wardrivers to locate RF signals?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
23
What are some of the ways to recognize phishing messages?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
24
____________________ is the formal expression used to refer to the process of finding a WLAN signal and recording information about it.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
25
____ allows computers and network equipment to gather data about network performance.
A) ICMP
B) SMTP
C) FTP
D) SNMP
A) ICMP
B) SMTP
C) FTP
D) SNMP
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
26
The first two versions of SNMP, SNMPv1 and SNMPv2, used ____ that acted like a password to allow or deny access to the information that was collected.
A) community strings
B) management information base (MIB)
C) packet sniffers
D) flash memories
A) community strings
B) management information base (MIB)
C) packet sniffers
D) flash memories
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
27
Wireless networks were identified by drawing on sidewalks or walls around the area of the network known as ____.
A) warchalking
B) phishing
C) pharming
D) dumpster diving
A) warchalking
B) phishing
C) pharming
D) dumpster diving
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
28
What are some of the security problems related to improperly recycled equipment?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
29
A wired NIC can be set to ____________________, which turns off the filtering mechanism and allows it to capture all the packets it receives.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
30
Describe two examples of social engineering attacks.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
31
____________________ involves phishers setting up their own search engines to direct traffic to illegitimate sites.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
32
What are some of the options for wireless NICs available for smaller devices like handheld PCs and PDAs?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
33
Each SNMP agent monitors network traffic and stores that information in its ____.
A) community strings
B) packet sniffer
C) management information base (MIB)
D) Type II PC card
A) community strings
B) packet sniffer
C) management information base (MIB)
D) Type II PC card
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
34
The GPS receiver can deduce its own location based on a mathematical principle called ____________________.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
35
What are the main characteristics of WLAN client utilities?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
36
The smallest mobile computing device is a(n) ____________________.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
37
What are the two fundamental characteristics of antennas?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
38
____, which runs under the Linux operating system, can report similar information as NetStumbler, such as the SSID.
A) Kismet
B) KisMAC
C) WZC
D) GPSMac
A) Kismet
B) KisMAC
C) WZC
D) GPSMac
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
39
Briefly describe the main characteristics of a tablet computer.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
40
Briefly describe a wireless packet sniffer.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
41
Briefly describe a packet sniffer.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
42
Match between columns
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck