Module 9

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

2

3G wireless offers data transfer rates of up to ____ Mbps

64, 128

Encryption keys are generally ____ or ____ bits long.

3

If you believe you are a victim of identity theft, you must act quickly to contact the ____ credit reporting agencies, every financial institution at which you have an account, and the issuer of every credit card you hold.

Default

If you change the default name of the wireless router or access point, you also prevent unknown users from detecting your network by attempting to randomly connect to a wireless network using a manufacturer name or the word "____" as an SSID.

WPA only

If you have both WPA and WEP available to you, your system will be most secure if you use ____.

Evil Twin

In a(n) ____ attack, a hacker sets up a computer to act as a legitimate access point, and then steals personal information from users trying to connect to it.

URL

Many email programs alert users when a link in an email message opens a webpage that is coded to a different ____ than the one displayed in the message.

Failing to change the default login for the device

One of the most serious mistakes that home users make when installing a wireless network is ____.

False

T/F A piconet can connect two to sixteen devices at a time.

True

T/F A wireless mesh network is a series of wireless nodes that relay communication across a network.

False

T/F Phishing is the act of driving through a neighborhood looking for unsecured wireless networks

True

T/F There are currently four generations of wireless technologies.

False

T/F Wired Passphrase Encryption (WPE) is a security protocol for wireless LANs that works by encrypting data sent over the network.

Novatel

The MiFi device is produced by the company ____.

each new node automatically configures itself to work without the use of cables

The advantage of a wireless mesh network is that ____.

single-factor

The combination of user login plus password is called ____ authentication

Brute Force

The countermeasure that protects individuals from becoming victims of ____ attacks is to use unique user names and passwords at each website that requires a login.

sometimes differ from

The coverage area for wireless broadband service will ____ the area where you can get cell phone reception.

Because SSIDs are not case sensitive, change the SSID frequently

The following is NOT on the security checklist for installing a wireless router: ____.

True

The latest, most secure form of SSL certificate is known as SSL-EV

False

The process of using a key to reverse encrypted text is called cryptography

Physcial, Logical

There are two types of security: ____ and ____.

Plain Text

Unencrypted information is called ____.

Active Content

____ components can make a webpage more useful by providing interactive elements like shipping calculators or mortgage payment tables

unsecured

By default, most wireless networks are ____.

bot

Another term for a zombie is a(n) ____.

canceling and reopening credit card accounts once every three months

All of the following are listed in the text as ways to avoid identity theft EXCEPT ____.

man-in-the-middle

A ____ attack occurs when transmissions, such as messages between users, logins, and normal connections with Web servers, that are being sent between two devices are intercepted by a third party.

Worm

A ____ is a self-replicating program usually hidden within another file and sent as an email attachment.

False

A bulkhead is a software program or hardware device that controls access between two networks

Subject's private key

A digital certificate usually contains all of the following EXCEPT ____.

Phishing

A(n) ____ attack involves phony email messages that include links to spoofed websites.

Threat

According to the text, any act or object that endangers an asset is known as a(n) ____.

False - They are called crackers

Computers hijacked without the owner's knowledge are often called spammers.


Set pelajaran terkait

7.1 Utilitarianism Too Demanding?

View Set

Chapter 11 Poisoning & Substance Abuse

View Set

Pierre L'Enfant and the purpose of Washington D.C.

View Set

Chapter 54: Drugs Acting on the Upper Respiratory Tract

View Set

Graphic Design History Final (pt. 1)

View Set