Post-Assessment 5 Flashcards
How long does it take to crack WEP using recent techniques?
minutes
Which type of control in intended to mitigate or lessen damage caused by an incident?
Corrective
A secret combination of letters that are only known to you would be _____
Something you know
SMTP server listens on port _____ and POP3 listens on port _____-
25,110
Which type of password attack has the attacker using a keylogger?
Capturing
Which type of cryptographic algorithms will apply padding to the output?
Sponge Function
Firewalls are also referred to as _____
Packet filters
IEE 802.11b supports wireless devices that can be up to _____ feet apart.
460
Which of the following techniques are used to match password digest with stolen digests.
All of the choices. ( Brute force, Dictionary, Rainbow Table )
Which IEEE 802.11 standard brings the “best of both worlds” together with a standard that incorporates the best of 802.11b?
802.11g
Which type of malware will lay dormant until triggered by an event?
Logic Bomb
Cryptography provides five basic protections for information. Which choice describes the protection that can prove that a user performed an action?
Non-repudiation
Which has algorithm creates a 160 bit hash and then pads it to 512 bits?
SHA-2
When an infected computer is placed under the remote conrol of an attacker it is called ___
Zombie