Sec + Flashcards
Study for the Sec+ certification
Wi-Fi Protected Setup
WPS
WPS
Wi-Fi Protected Setup
PIN recovery
Wi-Fi Protected Setup (WPS) exploit?
Wi-Fi Protected Setup (WPS) exploit?
PIN recovery
WPS PIN feature, which most recent models have enabled by ________
default
WPS PIN feature
This flaw allows a remote attacker to recover the WPS PIN in a few hours with a brute-force attack and, with the WPS PIN, the network’s WPA/WPA2 pre-shared key.[2] Users have been urged to turn off the WPS PIN feature,[3] although this may not be possible on some router models.[4]
_________ a type of computer security vulnerability typically found in web applications. XSS enables attackers to inject client-side scripts into web pages viewed by other users. It may be used by attackers to bypass access controls such as the same-origin policy.
Cross-site scripting
Encapsulating Security Payload (ESP) is a member of the IPsec protocol suite. It provides origin authenticity through source authentication, data integrity through hash functions and confidentiality through encryption protection for __________.
IP packets
Radio-frequency identification (______) uses electromagnetic fields to automatically identify and track tags attached to objects. The tags contain electronically-stored information. Passive tags collect energy from a nearby ______ reader’s interrogating radio waves.
RFID
RFID
RFID
Radio-frequency identification
Wi-Fi Protected Setup
WPS
WPS
Wi-Fi Protected Setup
contents of a rainbow table entry
Hash/Password
EOL
End of Life
POODLE (Padding Oracle on Downgraded Legacy Encryption)
cryptographic downgrade attack