SEC + Test 3

Ace your homework & exams now with Quizwiz!

Which cryptographic attack relies on the concepts of probability theory?

Birthday

The practice of sending unsolicited messages over Bluetooth is called:

Bluejacking

Gaining unauthorized access to a Bluetooth device is referred to as:

Bluesnarfing

Which of the following answers refers to the contents of a rainbow table entry?

Hash/Password

A type of wireless attack designed to exploit vulnerabilities of WEP is known as:

IV attack

Which of the acronyms listed below refers to a cryptographic attack where the attacker has access to both the plaintext and its encrypted version?

KPA (Known-plaintext attack)

Which of the following security protocols is the least susceptible to wireless replay attacks?

WPA2-CCMP

Which of the wireless technologies listed below are deprecated and should not be used due to their known vulnerabilities? (Select 2 answers)

WPS WEP

What is the name of a technology used for contactless payment transactions?

NFC (Near Field Communication)

Which of the following answers lists an example of a cryptographic downgrade attack?

POODLE (Padding Oracle On Downgraded Legacy Encryption)

Which of the following wireless technologies enables identification and tracking of tags attached to objects?

RFID (Radio Frequency Identification)

The practice of optimizing existing computer code without changing its external behavior is known as:

Refactoring

Which of the terms listed below refer(s) to software/hardware driver manipulation technique(s) that might be used to enable malware injection?

Refactoring Shimming

A modification introduced to a computer code that changes its external behavior (e.g. to maintain compatibility between a newer OS and an older version of application software) is called:

Shimming

IP spoofing and MAC spoofing rely on falsifying what type of address?

Source address


Related study sets

coms 1010 midterm - chpt 1, 2, 3, 4, 5, 10, 11 & 13 (need to insert 3,5, 10/11 w/ deft from all)

View Set

Chapter 14: Regulation of Bacterial Cellular Processes

View Set

anatomy ch. 6 skeletal system final questions

View Set

CFA Level I- Economics- Reading 11: Overview of the Business Cycle

View Set

FINAL EXAM REVIEW: Religious Wars

View Set

Midterm Exam - CSI-4480 - Salehian W23

View Set

Management Chapter 13, Management Chapter 12, Management Chapter 11, Management Chapter 10, Management Chapter 9, Management Chapter 8, Management Chapter 6, Management Chapter 5, Management Chapter 4, Management Chapter 3, Management Chapter 2

View Set