module 9

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

3G wireless offers data transfer rates of up to ____ Mbps.

2

An SSID may contain up to ____ alphanumeric characters.

32

Encryption keys are generally ____ or ____ bits long.

64, 128

1. All of the following are 802.11 standards EXCEPT_____.

802.11ad????

1. ____ components can make a webpage more useful by providing interactive elements like shipping calculators or mortgage payment tables.

Active content

____ components can make a webpage more useful by providing interactive elements like shipping calculators or mortgage payment tables.

Active content

The following is NOT on the security checklist for installing a wireless router: ____.

Change the SSID frequently because SSIDs are not case sensitive

A(n) ____ program can pose a threat because it can run without being compiled (that is, translated into computer-readable code).

JavaScript

1. The Ad-Aware Free ad blocker detects adware and eliminates ____.

Malware threats

The MiFi device is produced by the company ____.

Novatel

1. ____ encryption uses a single key that both the sender and receiver know.

Privite-key

SSL stands for ____.

Secure Sockets Layer

1. ____ is a process that hides encrypted messages within different types of files.

Steganography

____ is a process that hides encrypted messages within different types of files.

Steganography

Which of the following would provide the fastest transfer rate?

The device is close to the access point.

1. Many email programs alert users when a link in an email message opens a webpage that is coded to a different ____ than the one displayed in the message.

URL

Many email programs alert users when a link in an email message opens a webpage that is coded to a different ____ than the one displayed in the message.

URL

The following is an example of hacking: ____.

Unauthorized access to information being sent over a wireless network

____ is a standard that was developed by the Wi-Fi Alliance to address some of the inherent weaknesses

WPA

If you have both WPA and WEP available to you, your system will be most secure if you use ____.

WPA only

____ is the term for driving through a neighborhood with a wireless-enabled notebook looking for unsecured wireless networks.

Wardriving

1. A digital ID is purchased from ____.

a certificate authority

A digital certificate usually contains all of the following EXCEPT ____.

a keycode that destroys all evidence of the certificate upon use

Security experts warn against ____ in public places.

a. online banking b. checking e-mail c. online shopping D.$ all of the above

1. A port may be ____.

a. open b. closed c. stealth D.$ any of the above

To access the Internet using a WWAN, you need a USB modem for the device you want to use and ____.

an account with the appropriate cellular carrier

With WEP encryption, the key being used to encrypt the data is sent over the network ____ the actual data is encrypted.

before

Another term for a zombie is a(n) ____.

bot

The countermeasure that protects individuals from becoming victims of ____ attacks is to use unique user names and passwords at each website that requires a login.

brute force

All of the following are listed in the text as ways to avoid identity theft EXCEPT ____.canceling and reopening credit card accounts once every three months

canceling and reopening credit card accounts once every three months

A ____ is a technologically skilled person who uses his or her skills to obtain unauthorized entry into computers.

cracker

If you change the default name of the wireless router or access point, you also prevent unknown users from detecting your network by attempting to randomly connect to a wireless network using a manufacturer name or the word "____" as an SSID.

default

A MAC address contains ____.

digits and letters

The advantage of a wireless mesh network is that ____.

each new node automatically configures itself to work without the use of cables

Firewalls can be used on web ____.

either A or B

In a(n) ____ attack, a hacker sets up a computer to act as a legitimate access point, and then steals personal information from users trying to connect to it.

evil twin

One of the most serious mistakes that home users make when installing a wireless network is ____.

failing to change the default login for the device

A bulkhead is a software program or hardware device that controls access between two networks.

false

A piconet can connect two to sixteen devices at a time.

false

Computers hijacked without the owner's knowledge are often called spammers.

false

Phishing is the act of driving through a neighborhood looking for unsecured wireless networks.

false

The process of using a key to reverse encrypted text is called cryptography.

false

Wired Passphrase Encryption (WPE) is a security protocol for wireless LANs that works by encrypting data sent over the network.

false

In Wi-Fi terms, a(n) ____ is an area of network coverage.

hotspot

A web bug can do all of the following EXCEPT:

identify other bugs on the website

Disabling the SSID broadcast of a network makes that network ____ to roaming devices.

invisible

By default, most wireless networks are ____.

left unsecured

A ____ attack occurs when transmissions, such as messages between users, logins, and normal connections with Web servers, that are being sent between two devices are intercepted by a third party.

man-in-the-middle

A(n) ____ attack occurs when an attacker disrupts normal computer processing or denies processing entirely.

mani-in-the-middle

Using physical proximity to gain login information, passwords, or other personal information is known as a(n) ____.

over-the-shoulder attack

A(n) ____ stores login information in an encrypted form on a user's device.

password manager

A(n) ____ attack involves phony email messages that include links to spoofed websites.

phishing

1. There are two types of security: ____ and ____.

physical, logical

There are two types of security: ____ and ____.

physical, logical

A collection of devices connected via Bluetooth technology is called a(n) ____.

piconet

Unencrypted information is called ____.

plain text

1. A computer ____ permits traffic to leave and enter a computer.

port

A computer ____ permits traffic to leave and enter a computer.

port

1. A(n) ____ threat permits unauthorized data disclosure

secrecy

The Internet of Things (IoT) uses _____ to collect and transmit data using wireless connections so that data can be acted upon by a person or another machine.

sensors

The combination of user login plus password is called ____ authentication.

single-factor

The coverage area for wireless broadband service will ____ the area where you can get cell phone reception.

sometimes differ from

1. All of the following are categories of a computer security threat EXCEPT ____.

subterfuge

All of the following are categories of a computer security threat EXCEPT ____.

subterfuge

1. According to the text, any act or object that endangers an asset is known as a(n) ____.

threat

According to the text, any act or object that endangers an asset is known as a(n) ____.

threat

If you believe you are a victim of identity theft, you must act quickly to contact the ____ credit reporting agencies, every financial institution at which you have an account, and the issuer of every credit card you hold.

three

A wireless mesh network is a series of wireless nodes that relay communication across a network.

true

The latest, most secure form of SSL certificate is known as SSL-EV.

true

There are currently four generations of wireless technologies.

true

A digital ____ is a pattern containing copyright information that is inserted into a digital image, animation, or audio or video file.

watermark

A(n) ____ local area network is a network in which devices use high-frequency radio waves to communicate with a base station, which is connected to the Internet.

wireless

A ____ is a self-replicating program usually hidden within another file and sent as an email attachment.

worm


Ensembles d'études connexes

american government quiz questions

View Set

Evropa in njen naravnogeografski okvir

View Set

Luke 2 & Luke 4-7 Bible Quiz Questions

View Set

Unit 5 Lesson 2: Naming and Writing Formulas for Ionic Compounds

View Set