Module 9
2
3G wireless offers data transfer rates of up to ____ Mbps
64, 128
Encryption keys are generally ____ or ____ bits long.
3
If you believe you are a victim of identity theft, you must act quickly to contact the ____ credit reporting agencies, every financial institution at which you have an account, and the issuer of every credit card you hold.
Default
If you change the default name of the wireless router or access point, you also prevent unknown users from detecting your network by attempting to randomly connect to a wireless network using a manufacturer name or the word "____" as an SSID.
WPA only
If you have both WPA and WEP available to you, your system will be most secure if you use ____.
Evil Twin
In a(n) ____ attack, a hacker sets up a computer to act as a legitimate access point, and then steals personal information from users trying to connect to it.
URL
Many email programs alert users when a link in an email message opens a webpage that is coded to a different ____ than the one displayed in the message.
Failing to change the default login for the device
One of the most serious mistakes that home users make when installing a wireless network is ____.
False
T/F A piconet can connect two to sixteen devices at a time.
True
T/F A wireless mesh network is a series of wireless nodes that relay communication across a network.
False
T/F Phishing is the act of driving through a neighborhood looking for unsecured wireless networks
True
T/F There are currently four generations of wireless technologies.
False
T/F Wired Passphrase Encryption (WPE) is a security protocol for wireless LANs that works by encrypting data sent over the network.
Novatel
The MiFi device is produced by the company ____.
each new node automatically configures itself to work without the use of cables
The advantage of a wireless mesh network is that ____.
single-factor
The combination of user login plus password is called ____ authentication
Brute Force
The countermeasure that protects individuals from becoming victims of ____ attacks is to use unique user names and passwords at each website that requires a login.
sometimes differ from
The coverage area for wireless broadband service will ____ the area where you can get cell phone reception.
Because SSIDs are not case sensitive, change the SSID frequently
The following is NOT on the security checklist for installing a wireless router: ____.
True
The latest, most secure form of SSL certificate is known as SSL-EV
False
The process of using a key to reverse encrypted text is called cryptography
Physcial, Logical
There are two types of security: ____ and ____.
Plain Text
Unencrypted information is called ____.
Active Content
____ components can make a webpage more useful by providing interactive elements like shipping calculators or mortgage payment tables
unsecured
By default, most wireless networks are ____.
bot
Another term for a zombie is a(n) ____.
canceling and reopening credit card accounts once every three months
All of the following are listed in the text as ways to avoid identity theft EXCEPT ____.
man-in-the-middle
A ____ attack occurs when transmissions, such as messages between users, logins, and normal connections with Web servers, that are being sent between two devices are intercepted by a third party.
Worm
A ____ is a self-replicating program usually hidden within another file and sent as an email attachment.
False
A bulkhead is a software program or hardware device that controls access between two networks
Subject's private key
A digital certificate usually contains all of the following EXCEPT ____.
Phishing
A(n) ____ attack involves phony email messages that include links to spoofed websites.
Threat
According to the text, any act or object that endangers an asset is known as a(n) ____.
False - They are called crackers
Computers hijacked without the owner's knowledge are often called spammers.