Post Assessment 3 Flashcards
An employee wants wireless access at her cubical but the company doesn’t provide any so she brings her own wireless router to work and connects it into her company network. What type of wireless attack do we have here?
Rouge AP
An example of coding standard is the use of ______
Wrapper functions
Which of the following is an authentication category
All of the choices
Which of the following DLP states is data being used by “endpoint devices”?
Data in use
How many non-overlapping channels are available in 802.11b?
3
The IEEE 802.1Q protocol adds a ____ to the packets for ID.
Tag
Which type of commercial lock has a keyed cylinder in both the inside and outside knobs so that a key is used to lock or unlock both sides at the same time?
Store entry double cylinder
An attack that sends unsolicited message to Bluetooth enabled devices called ______
Bluejacking
To make a password stronger, non-keyboard characters can be used. What key is used to create non-keyboard special characters?
Alt
Which of the following are characteristics of effective passwords?
long and complex
Which one of these protocols would be found mostly on UNIX and Linux computers?
SCP
Passwords were first used to authenticate computers users at MIT in what year>
1961
Security is said to be _______ to convenience.
Inversely proportional
DoS and DDoS attacks use ______ to prevent authorized users from accessing the system resources.
SYN
RADIUS stands for ________
Remote Authentication Dail In User Service