Security+ - Quiz 2
___________________ is an attack in which the intruder sends a frame to the AP with a spoofed address to make it look like it came from the victim and disconnects them from the network.
Disassociation
Which type of attack is one in which a rogue wireless access point poses as a legitimate wireless service provider to intercept information that users transmit?
Evil Twin
Which of the following devices are the first line of defense for networks connected to the Internet?
Firewalls
Which of the following is not a routing protocol?
ICMP
Which authentication method uses a key distribution center (KCD)?
Kerberos
Which access control model is a static model that uses predefined access privileges for resources that are assigned by the administrator?
Mandatory Access Control (MAC)
Whether your server operating system can force the change of a password is considered what kind of a security issue?
Operational
A firewall operating as a ___________________ firewall will pass or block packets based on their application or TCP port number.
Packet filter
Which remote access protocol, implemented almost exclusively by Cisco, is a central server providing remote access usernames that dial-up users can use for authentication.
TACACS+