Post Assessment 3 Flashcards

1
Q

An employee wants wireless access at her cubical but the company doesn’t provide any so she brings her own wireless router to work and connects it into her company network. What type of wireless attack do we have here?

A

Rouge AP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

An example of coding standard is the use of ______

A

Wrapper functions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following is an authentication category

A

All of the choices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following DLP states is data being used by “endpoint devices”?

A

Data in use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How many non-overlapping channels are available in 802.11b?

A

3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The IEEE 802.1Q protocol adds a ____ to the packets for ID.

A

Tag

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which type of commercial lock has a keyed cylinder in both the inside and outside knobs so that a key is used to lock or unlock both sides at the same time?

A

Store entry double cylinder

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

An attack that sends unsolicited message to Bluetooth enabled devices called ______

A

Bluejacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

To make a password stronger, non-keyboard characters can be used. What key is used to create non-keyboard special characters?

A

Alt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following are characteristics of effective passwords?

A

long and complex

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which one of these protocols would be found mostly on UNIX and Linux computers?

A

SCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Passwords were first used to authenticate computers users at MIT in what year>

A

1961

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Security is said to be _______ to convenience.

A

Inversely proportional

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

DoS and DDoS attacks use ______ to prevent authorized users from accessing the system resources.

A

SYN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

RADIUS stands for ________

A

Remote Authentication Dail In User Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly