Security+ Practice 3

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Which of the terms listed below refer(s) to software/hardware driver manipulation technique(s) that might be used to enable malware injection? (Select all that apply) A. Refactoring B. Sandboxing C. Fuzz testing D. Shimming E. Sideloading

A,D

Which of the wireless technologies listed below are deprecated and should not be used due to their known vulnerabilities? (Select 2 answers) A.WPS B. WAP C. WPA2 D. WAF E. WEP

A,E

Which of the following security protocols is the least susceptible to wireless replay attacks? A. WPA2-CCMP B. WPA-TKIP C. WPA2-PSK D. WPA-CCMP E. WPA2-TKIP

A. WPA2-CCMP

Which cryptographic attack relies on the concepts of probability theory? A. KPA B. Brute-force C. Dictionary D. Birthday

Birthday

The practice of sending unsolicited messages over Bluetooth is called

Bluejacking

Gaining unauthorized access to a Bluetooth device is referred to as

Bluesnarfing

An attack against encrypted data that relies heavily on computing power to check all possible keys and passwords until the correct one is found is known as

Brute-force attack

Which of the following wireless technologies enables identification and tracking of tags attached to objects A. WTLS B. GPS C.RFID D. WAF

C. RFID

A wireless disassociation attack is a type of

Denial of Service (Dos) attack

A wireless jamming attack is a type of

Denial of Service (Dos) attack

Which password attack takes advantage of a predefined list of words? A. Birthday attack B. Replay attack C. Dictionary attack D. Brute-force attack

Dictionary attack

A situation where cryptographic hash function produces two different digests for the same data input is referred to as hash collision

False

Which of the following answers refers to the contents of a rainbow table entry? A. Hash/Password B. IP address/Domain name C. Username/Password D. Account name/Hash

Hash/Password

A type of wireless attack designed to exploit vulnerabilities of WEP is known as

IV attack

Which of the acronyms listed below refers to a cryptographic attack where the attacker has access to both the plaintext and its encrypted version? A. KEK B. POODLE C.KPA D. CSRF

KPA

One of the measures for bypassing the failed logon attempt account lockout policy is to capture any relevant data that might contain the password and brute force it offline

True

Rainbow tables are lookup tables used to speed up the process of password guessing

True

The term "Evil twin" refers to a rogue Wireless Access Point (WAP) set up for eavesdropping or stealing sensitive user data. Evil twin replaces the legitimate access point and by advertising its own presence with the same Service Set Identifier (SSID, a.k.a. network name) appears as a legitimate access point to connecting hosts.

True

The term "URL hijacking" (a.k.a. "Typosquatting") refers to a practice of registering misspelled domain name closely resembling other well established and popular domain name in hopes of getting Internet traffic from users who would make errors while typing in the URL in their web browsers.

True

A solution that simplifies configuration of new wireless networks by allowing non-technical users to easily configure network security settings and add new devices to an existing network is known as

WPS

What is the name of a technology used for contactless payment transactions

NFC

Which of the following answers lists an example of a cryptographic downgrade attack? A. MITM B. KPA C. POODLE D. XSRF

POODLE

The practice of optimizing existing computer code without changing its external behavior is known as:

Refactoring

A modification introduced to a computer code that changes its external behavior (e.g. to maintain compatibility between a newer OS and an older version of application software) is called

Shimming

IP spoofing and MAC spoofing rely on falsifying what type of address

Source address


संबंधित स्टडी सेट्स

Nursing 10 Quiz 1 (week 1 - week 4)

View Set

윤리와 사상. 쉬운. 굉장히. 엄청난.

View Set

MEGA Chapter 23 Genomics I: Analysis of DNA

View Set

Research Workshop: Generating Research Questions and Evaluating Sources

View Set

MRKT 453 (International Marketing) Exam #1

View Set