Post-Assessment 5 Flashcards

1
Q

How long does it take to crack WEP using recent techniques?

A

minutes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which type of control in intended to mitigate or lessen damage caused by an incident?

A

Corrective

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A secret combination of letters that are only known to you would be _____

A

Something you know

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

SMTP server listens on port _____ and POP3 listens on port _____-

A

25,110

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which type of password attack has the attacker using a keylogger?

A

Capturing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which type of cryptographic algorithms will apply padding to the output?

A

Sponge Function

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Firewalls are also referred to as _____

A

Packet filters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

IEE 802.11b supports wireless devices that can be up to _____ feet apart.

A

460

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following techniques are used to match password digest with stolen digests.

A

All of the choices. ( Brute force, Dictionary, Rainbow Table )

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which IEEE 802.11 standard brings the “best of both worlds” together with a standard that incorporates the best of 802.11b?

A

802.11g

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which type of malware will lay dormant until triggered by an event?

A

Logic Bomb

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Cryptography provides five basic protections for information. Which choice describes the protection that can prove that a user performed an action?

A

Non-repudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which has algorithm creates a 160 bit hash and then pads it to 512 bits?

A

SHA-2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

When an infected computer is placed under the remote conrol of an attacker it is called ___

A

Zombie

How well did you know this?
1
Not at all
2
3
4
5
Perfectly