Quiz 4
What would be the result of sending the string AAAAAAAAAAAAAAAAAAAA into a variable that has allocated space for 8 bytes?
Buffer Overflow
What security element would be a crucial part of a defense in depth network design?
Firewall
How many stages are used in the WPA Handshake?
Four
What protocol is used for a Smurf attack?
ICMP
What is the purpose of performing a Bluetooth scan?
Identifying Endpoints
What is the SSID Used for?
Identifying a Network
What are the two types of wireless networks according to the text?
Infrastructure and AD Hoc
What mode has to be enabled on a network interface to allow all headers in wireless traffic to be captured?
Monitor