Security Administration (Ch. 11) Flashcards

1
Q

Involves sending unsolicited messages to Bluetooth devices when they are in range.

A

bluejacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Attack that involves getting data from a Bluetooth device.

A

bluesnarfing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

BYOD

A

Bring Your Own Device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

COPE

A

Company-Owned and -Provided Equipment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

CYOD

A

Choose Your Own Device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A rogue wireless access point that mimics the SSID of a legitimate access point.

A

evil twin

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Global system for mobile communications. This is commonly known as 2G

A

GSM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

This is a standard for wireless communication of

high-speed data for mobile devices. It is what is commonly called 4G.

A

(LTE) Long-Term Evolution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

This is a 3G standard based on GSM. It is essentially an improvement over GSM.

A

(UMTS) Universal Mobile Telecommunications Systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly