Deck 4: Active Wireless Attacks
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Match between columns
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/42
Play
Full screen (f)
Deck 4: Active Wireless Attacks
1
An incorrect configuration of wireless hardware or software can often result in easy access to a system.
True
2
____ occurs when an individual uses the personal information of someone else to impersonate that individual with the intent to commit fraud or other crimes.
A) Identity theft
B) Spam
C) DoS attack
D) Phishing
A) Identity theft
B) Spam
C) DoS attack
D) Phishing
A
3
DoS attacks are rare against wired network servers.
False
4
Before users can be given access to a computer and its data, they must in some way prove that they are who they claim to be. This process of providing proof is known as ____.
A) authorization
B) encryption
C) cryptography
D) authentication
A) authorization
B) encryption
C) cryptography
D) authentication
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
5
In a ____ attack, each word from a dictionary is encoded in the same way the computer encodes a user's password for protection. Attackers then compare the encoded dictionary words against those in the encoded password file.
A) DoS
B) brute force
C) dictionary
D) rogue AP
A) DoS
B) brute force
C) dictionary
D) rogue AP
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
6
Authentication can be performed based on what you have, what you know, or what you are.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
7
The ____ is a popular protocol used to manage networked equipment.
A) SMTP
B) SNMP
C) FTP
D) POP3
A) SMTP
B) SNMP
C) FTP
D) POP3
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
8
____ is a service that allows devices on a network to discover other devices and determine how to work with them.
A) IPSec
B) SNMP
C) UPnP
D) PnP
A) IPSec
B) SNMP
C) UPnP
D) PnP
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
9
____ typically displays advertising banners or pop-up ads and is frequently encountered while visiting Web sites with a browser.
A) Logic bomb
B) Adware
C) Spam
D) Phishing
A) Logic bomb
B) Adware
C) Spam
D) Phishing
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
10
____ is a general term used to describe software that violates a user's personal security.
A) Virus
B) Spyware
C) Worm
D) Logic bomb
A) Virus
B) Spyware
C) Worm
D) Logic bomb
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
11
A computer ____ is a program that secretly attaches itself to another document or program and executes when that document or program is opened.
A) virus
B) worm
C) spam
D) logic bomb
A) virus
B) worm
C) spam
D) logic bomb
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
12
In a ____ attack, an attacker attempts to create every possible password combination by systematically changing one character at a time in a password.
A) dictionary
B) brute force
C) DoS
D) rogue AP
A) dictionary
B) brute force
C) DoS
D) rogue AP
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
13
A ____ bypasses all of the network security and opens the entire network and all users to direct attacks.
A) wireless router
B) firewall
C) rogue access point
D) wireless gateway
A) wireless router
B) firewall
C) rogue access point
D) wireless gateway
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
14
A ____ attack is designed to prevent a device from performing its intended function.
A) denial-of-service (DoS)
B) rogue AP
C) phishing
D) pharming
A) denial-of-service (DoS)
B) rogue AP
C) phishing
D) pharming
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
15
A ____ is a computer program that lies dormant until it is triggered by a specific event.
A) worm
B) virus
C) spam
D) logic bomb
A) worm
B) virus
C) spam
D) logic bomb
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
16
In technical terms, ____ describes the points of risk regarding the penetration of a security defense.
A) security vulnerability
B) dictionary attack
C) password guessing
D) IPSec
A) security vulnerability
B) dictionary attack
C) password guessing
D) IPSec
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
17
Because CSMA/CA has all stations wait a random amount of time after the medium is clear, the number of collisions is significantly reduced.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
18
____ allows the Windows operating system to automatically detect new hardware when it is installed on a computer.
A) UPnP
B) SNMP
C) IPSec
D) PnP
A) UPnP
B) SNMP
C) IPSec
D) PnP
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
19
One of the spyware tools often used is ____.
A) DoS
B) spam
C) adware
D) rogue APs
A) DoS
B) spam
C) adware
D) rogue APs
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
20
Logic bombs are easy to detect before they are triggered.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
21
The Anti-Spyware Coalition defines ____________________ as technologies that are implemented in ways that impair a user's control over the use of system resources.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
22
With wireless CSMA/CA the amount of time that a device must wait after the medium is clear is called the ____________________.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
23
A(n) ____________________ may be defined as a weakness or flaw in an information system that could be exploited to cause harm.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
24
Most successful wireless DoS attacks are performed at the ____ layer of the OSI model.
A) Physical
B) MAC
C) Network
D) Application
A) Physical
B) MAC
C) Network
D) Application
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
25
What are the minimum criteria for creating good passwords?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
26
What are the problems with using default passwords?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
27
Because the wireless medium is shared among all devices, there must be rules for cooperation among the wireless devices. The 802.11 standard uses a procedure known as ____.
A) ISM
B) CSMA/CD
C) CSMA/CA
D) IPSec
A) ISM
B) CSMA/CD
C) CSMA/CA
D) IPSec
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
28
What are some of the characteristics of weak passwords?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
29
What are some of the symptoms that indicate a virus has infected a computer?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
30
A ____ program creates fake packets and flood the wireless network.
A) MAC
B) packet sniffer
C) packet generator
D) CSMA/CA
A) MAC
B) packet sniffer
C) packet generator
D) CSMA/CA
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
31
____ attacks are designed to deny wireless devices access to the access point itself.
A) DoS
B) Phishing
C) Rogue AP
D) Wireless DoS
A) DoS
B) Phishing
C) Rogue AP
D) Wireless DoS
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
32
With explicit ____, an acknowledgment frame (abbreviated ACK) is sent by the receiving device back to the sending device to confirm that the data frame arrived intact.
A) packet generator
B) slot time
C) CRC
D) frame acknowledgment
A) packet generator
B) slot time
C) CRC
D) frame acknowledgment
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
33
What are the security problems related to supporting remote access in wireless gateways?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
34
What are the security problems related to adware?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
35
____________________ are devices that combine access point, router, and network address translation features.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
36
____ attacks flood the RF spectrum with enough radiomagnetic interference to prevent a device from effectively communicating with the AP.
A) Physical layer
B) MAC layer
C) LLC layer
D) Transport layer
A) Physical layer
B) MAC layer
C) LLC layer
D) Transport layer
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
37
Once an attacker's wireless device has entered the network and focused its attacks at other similar devices this is known as a(n) ____________________.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
38
Briefly explain the password paradox.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
39
What are the problems of using community strings in SNMP?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
40
Briefly describe the Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) procedure.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
41
Briefly describe how to perform a wired network DoS attack.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
42
Match between columns
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck