Chapter 5, 6
List and briefly describe four ways you can better protect your privacy and security.
-Think before you do something -Stay updated -check out your privacy setting -block the cookies -have secure connections
What is Bluetooth's rate of transmission?
1 Mbps
Which of the following is NOT a privacy best practice?
Always carry your Social Security number with you
_________________ provides proof of the genuineness of the user.
Authentication
Which type of BlueTooth attack accesses unauthorized information from a wireless device through a Bluetooth connection, often between cell phones and laptop computers?
Bluesnarfing
How can cryptography protect confidentiality of information?
Cryptography can keep information confidently by having public and private keys. when the data get encrypted all the words change so the only person who will be able to see it is people with the keys
Online data is collected for a number of activities, but not for online purchases.
False
Whereas tablets are designed for performance, laptops are focused on ease of use.
False
Wi-Fi networks operate in basically the same way as cellular telephony networks that are designed, installed, and maintained by the wireless telephone carriers.
False
The current location of a device can be pinpointed on a map through the device's _______________.
GPS
Which of the following is an advantage of hardware encryption over software encryption?
Hardware encryption is not subject to attacks like software encryption
Which of the following is NOT an element of asymmetric cryptography?
Hash algorithm
In the field of computer networking and wireless communications, what is the most widely known and influential organization?
IEEE
Which of the following can be described as data that is used to describe the content or structure of the actual data?
Metadata
How many keys are used in symmetric cryptography?
One
Why is public key cryptography?
Public Key Cryptography uses a pair of keys that are used to encrypt and decrypt data and to protect against unauthorized access.
What is another name for asymmetric cryptography?
Public key cryptography
What serves as the network name identifier in a Wi-Fi network?
SSID
Which technology hides the existence of data?
Steganography
Which of the following is NOT true regarding how individuals are concerned how their private data is being used?
Their personal information is no more at risk today than it was 10 years ago.
Because a wireless signal can only be transmitted for several hundred feet, multiple APs are used to provide "cells" or areas of coverage.
True
Most Bluetooth devices have a range of only about 10 meters.
True
Unless remote management is essential, it is recommended that this feature be disabled with a wireless router.
True
List the four characteristics a hash algorithm should have if it is to be considered secure.
Two different data sets can't make the same digest all data provides the same size digest its impossible to make a data set that has a desired or predefined hash the digest can't be reversed
Which of these is a characteristic of a secure hash algorithm?
Two different sets of data cannot produce the same digest
Which of the following is a legitimate responsibility of an organization regarding user private data?
Use proprietary methods for data collection to maintain security.
The technical name for a Wi-Fi network
WLAN
A security setting that provides the optimum level of wireless security
WPA2 personal
____________________ is a wireless data network technology that is designed to provide high-speed data connections for mobile devices.
Wi-Fi
Which of the following is an optional means of configuring WPA2 Personal security using a PIN?
Wi-Fi Protected Setup (WPS)
Briefly describe Wi-Fi.
Wi-Fi is a wireless network that allows computers and other devices to communicate.
A more sophisticated device used in an office setting instead of a wireless router
access point
In an office setting, instead of using a wireless broadband router, a more sophisticated device known as a(n) ____________________ is used.
access point / ap
Procedures based on a mathematical formula used to encrypt and decrypt the data
algorithm
Cryptography that uses two mathematically related keys
asymmetric
An attack that sends unsolicited messages to Bluetooth-enabled devices
bluejacking
An attack that accesses unauthorized information from a wireless device through a Bluetooth connection
bluesnarfing
There are two major types of wireless networks that are popular today among users. One of these networks is Wi-Fi; what is the other?
bluetooth
Unencrypted data cleartext
cleartext
What are the three benefits of a digital signature?
contract speed enhanced security lower transaction
A digital signature can provide which of the following benefits?
data integrity
The unique digital fingerprint created by a one-way hash algorithm
digest
What does a VPN use to ensure that any transmissions that are intercepted will be indecipherable?
encryption
An AP or another computer that is set up by an attacker designed to mimic the authorized Wi-Fi device
evil twin
An attacker sets up a look-alike Wi-Fi network, tempting unsuspecting users to connect with the attacker's Wi-Fi network instead. What is this called?
evil twin
Steganography can only utilize image files to hide data.
false
Which of the following creates a digest and does not create ciphertext that can later be decrypted?
hash alhorithm
Which type of cryptography creates a value that is primarily used for comparison purposes?
hashing
Which of the following is a place where steganography can hide data?
in the metadata of a file
What is the security advantage of turning on guest access?
it separates the guest traffic from the nonguest traffic on the internet.
A mathematical value entered into a cryptographic algorithm to produce encrypted data
key
A unique mathematical __________ is input into the encryption algorithm to lock down the data by creating the ciphertext.
key
What security feature on a smartphone prevents the device from being used until a passcode is entered?
lock screen
Proving that a document was created by a particular user is referred to as which of the following?
nonrepudiation
The process of proving that a user performed an action
nonrepudiation
An asymmetric encryption key that must be protected
private key
An asymmetric encryption key that does not have to be protected
public key
Which of the following is NOT a protection for information that cryptography can provide?
redundancy
On tablets and smartphones, what feature can be used that can erase the contents of the device if lost or stolen?
remote wipe
Removing the built-in limitations and protections on Google Android devices
rooting
Downloading an app from an unofficial third-party website
sideloading
Which mobile device setting regulates when the device goes into hibernation mode
sleep time
What are some of the attacks on Wi-Fi?
someone could use a pineapple device or there could be a fake network
What is the most secure option for the type of passcode that can be entered to access a mobile device?
strong alphanumeric password
Encryption that uses a single key to encrypt and decrypt a message
symmetric
Unlike hashing, in which the hash is not intended to be decrypted, ______________ algorithms are designed to encrypt and decrypt the ciphertext using a single key.
symmetric
What is Wi-Fi Protected Setup (WPS)?
this lets you join a network without selecting the network name and entering a password
If userA wants to send a secure message to userB using an asymmetric cryptographic algorithm, which key does userB use to decrypt the message?
userA's public key
If userA sends a secure message to userB using an asymmetric cryptographic algorithm, and userB sends a reply, what key is used if userA wants another user, userC to read the reply message?
userC's public key
What type of network uses an unsecured public network, such as the Internet, as if it were a secure private network?
virtual private network
From what term is war driving derived?
war dialing
A new class of mobile technology consisting of devices that can be worn by the user instead of carried
wearable technology
Which type of Wi-Fi device acts as the base station for wireless devices as well as providing a gateway to the external Internet?
wireless router
Why should you disable Bluetooth on smartphones and tablets?
you should disable your Bluetooth because when it is on you open yourself up for vulnerabilities