Post-Assessment 4 Flashcards
A Bluetooth device can transmit ________
1 million bits per second
WPS pins can be cracked in less than ______
4 hours
A version of the email scam that contacts a potential victim with a telephone call is known as _____
Vishing
Which new asymmetric cryptographic algorithm uses a different foundation that prime numbers or points on a curve?
NTRUEncrypt
In the order of volatility which of the following should be first to be retrieved?
Registry, cache and peripheral memory
Which spam filtering method analyzes every word in each email?
Bayesian filter
What percent of iOS apps exhibit at least one risky behavior?
91
Which type of commercial lock has a keyed cylinder in both the inside and the outside knobs so that a key is used to lock or unlock both sides independently?
Communicating double cylinder lock
Keccak will become SHA-3. Which of the following is like SHA-3?
None of the above. ( SHA-1,MD5,SHA-0 )
On average ______ percent of all laptops stolen in the US are from public schools.
33
Which type of monitoring methodology uses a baseline?
Anomaly-based
Which ICMP filed identifies the general category of the message?
Type
Which of the following would be found in a phishing attack?
All of the above. ( Urgent requests for action, Deceptive web link, Logos that look genuine)
What should individuals in the immediate vicinity of a potential crime event do:?
Damage control
What are the three protections that must be extended over information?
Availability, Confidentiality, Integrity