Chapter 5, 6

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

List and briefly describe four ways you can better protect your privacy and security.

-Think before you do something -Stay updated -check out your privacy setting -block the cookies -have secure connections

What is Bluetooth's rate of transmission?

1 Mbps

Which of the following is NOT a privacy best practice?

Always carry your Social Security number with you

_________________ provides proof of the genuineness of the user.

Authentication

Which type of BlueTooth attack accesses unauthorized information from a wireless device through a Bluetooth connection, often between cell phones and laptop computers?

Bluesnarfing

How can cryptography protect confidentiality of information?

Cryptography can keep information confidently by having public and private keys. when the data get encrypted all the words change so the only person who will be able to see it is people with the keys

Online data is collected for a number of activities, but not for online purchases.

False

Whereas tablets are designed for performance, laptops are focused on ease of use.

False

Wi-Fi networks operate in basically the same way as cellular telephony networks that are designed, installed, and maintained by the wireless telephone carriers.

False

The current location of a device can be pinpointed on a map through the device's _______________.

GPS

Which of the following is an advantage of hardware encryption over software encryption?

Hardware encryption is not subject to attacks like software encryption

Which of the following is NOT an element of asymmetric cryptography?

Hash algorithm

In the field of computer networking and wireless communications, what is the most widely known and influential organization?

IEEE

Which of the following can be described as data that is used to describe the content or structure of the actual data?

Metadata

How many keys are used in symmetric cryptography?

One

Why is public key cryptography?

Public Key Cryptography uses a pair of keys that are used to encrypt and decrypt data and to protect against unauthorized access.

What is another name for asymmetric cryptography?

Public key cryptography

What serves as the network name identifier in a Wi-Fi network?

SSID

Which technology hides the existence of data?

Steganography

Which of the following is NOT true regarding how individuals are concerned how their private data is being used?

Their personal information is no more at risk today than it was 10 years ago.

Because a wireless signal can only be transmitted for several hundred feet, multiple APs are used to provide "cells" or areas of coverage.

True

Most Bluetooth devices have a range of only about 10 meters.

True

Unless remote management is essential, it is recommended that this feature be disabled with a wireless router.

True

List the four characteristics a hash algorithm should have if it is to be considered secure.

Two different data sets can't make the same digest all data provides the same size digest its impossible to make a data set that has a desired or predefined hash the digest can't be reversed

Which of these is a characteristic of a secure hash algorithm?

Two different sets of data cannot produce the same digest

Which of the following is a legitimate responsibility of an organization regarding user private data?

Use proprietary methods for data collection to maintain security.

The technical name for a Wi-Fi network

WLAN

A security setting that provides the optimum level of wireless security

WPA2 personal

____________________ is a wireless data network technology that is designed to provide high-speed data connections for mobile devices.

Wi-Fi

Which of the following is an optional means of configuring WPA2 Personal security using a PIN?

Wi-Fi Protected Setup (WPS)

Briefly describe Wi-Fi.

Wi-Fi is a wireless network that allows computers and other devices to communicate.

A more sophisticated device used in an office setting instead of a wireless router

access point

In an office setting, instead of using a wireless broadband router, a more sophisticated device known as a(n) ____________________ is used.

access point / ap

Procedures based on a mathematical formula used to encrypt and decrypt the data

algorithm

Cryptography that uses two mathematically related keys

asymmetric

An attack that sends unsolicited messages to Bluetooth-enabled devices

bluejacking

An attack that accesses unauthorized information from a wireless device through a Bluetooth connection

bluesnarfing

There are two major types of wireless networks that are popular today among users. One of these networks is Wi-Fi; what is the other?

bluetooth

Unencrypted data cleartext

cleartext

What are the three benefits of a digital signature?

contract speed enhanced security lower transaction

A digital signature can provide which of the following benefits?

data integrity

The unique digital fingerprint created by a one-way hash algorithm

digest

What does a VPN use to ensure that any transmissions that are intercepted will be indecipherable?

encryption

An AP or another computer that is set up by an attacker designed to mimic the authorized Wi-Fi device

evil twin

An attacker sets up a look-alike Wi-Fi network, tempting unsuspecting users to connect with the attacker's Wi-Fi network instead. What is this called?

evil twin

Steganography can only utilize image files to hide data.

false

Which of the following creates a digest and does not create ciphertext that can later be decrypted?

hash alhorithm

Which type of cryptography creates a value that is primarily used for comparison purposes?

hashing

Which of the following is a place where steganography can hide data?

in the metadata of a file

What is the security advantage of turning on guest access?

it separates the guest traffic from the nonguest traffic on the internet.

A mathematical value entered into a cryptographic algorithm to produce encrypted data

key

A unique mathematical __________ is input into the encryption algorithm to lock down the data by creating the ciphertext.

key

What security feature on a smartphone prevents the device from being used until a passcode is entered?

lock screen

Proving that a document was created by a particular user is referred to as which of the following?

nonrepudiation

The process of proving that a user performed an action

nonrepudiation

An asymmetric encryption key that must be protected

private key

An asymmetric encryption key that does not have to be protected

public key

Which of the following is NOT a protection for information that cryptography can provide?

redundancy

On tablets and smartphones, what feature can be used that can erase the contents of the device if lost or stolen?

remote wipe

Removing the built-in limitations and protections on Google Android devices

rooting

Downloading an app from an unofficial third-party website

sideloading

Which mobile device setting regulates when the device goes into hibernation mode

sleep time

What are some of the attacks on Wi-Fi?

someone could use a pineapple device or there could be a fake network

What is the most secure option for the type of passcode that can be entered to access a mobile device?

strong alphanumeric password

Encryption that uses a single key to encrypt and decrypt a message

symmetric

Unlike hashing, in which the hash is not intended to be decrypted, ______________ algorithms are designed to encrypt and decrypt the ciphertext using a single key.

symmetric

What is Wi-Fi Protected Setup (WPS)?

this lets you join a network without selecting the network name and entering a password

If userA wants to send a secure message to userB using an asymmetric cryptographic algorithm, which key does userB use to decrypt the message?

userA's public key

If userA sends a secure message to userB using an asymmetric cryptographic algorithm, and userB sends a reply, what key is used if userA wants another user, userC to read the reply message?

userC's public key

What type of network uses an unsecured public network, such as the Internet, as if it were a secure private network?

virtual private network

From what term is war driving derived?

war dialing

A new class of mobile technology consisting of devices that can be worn by the user instead of carried

wearable technology

Which type of Wi-Fi device acts as the base station for wireless devices as well as providing a gateway to the external Internet?

wireless router

Why should you disable Bluetooth on smartphones and tablets?

you should disable your Bluetooth because when it is on you open yourself up for vulnerabilities


संबंधित स्टडी सेट्स

Advantages/Disadvantages Direct Democracy

View Set

Development: Childhood Disorders

View Set

chapter 4 (and questions on paper)

View Set

23.5 The Long-Run Industry Situation: Exit and Entry

View Set