1.Which term refers to a set of wireless technologies that enables smartphones and other devices to establish radio communication over a short proximity?
Near field communication (NFC)

2.An advantage of Wired Equivalent Privacy (WEP) is that it can be trusted alone to provide confidentiality.
False

3.Which attack technique involves sending an unauthorized message to another Bluetooth device?
Bluejacking

4.The primary reason that spread-spectrum technology is used in 802.11 protocols is to provide security.
False

5.ZigBee is a low-power, personal area networking technology described by the IEEE 802.15.4 series.
True

6.802.11a operates in the __________ spectrum using orthogonal frequency division multiplexing (OFDM).
5-GHz

7.Why is wireless problematic from a security standpoint?
There is no control over the physical layer of traffic.

8.Alert messages in Wireless Transport Layer Security (WTLS) are sometimes sent in plaintext and not authenticated.
True

9.Which term refers to a specific technique of using an HTTP client to handle authentication on a wireless network?
Captive portal

10.The cryptographic standard proposed for 3G networks is known as __________.
KASUMI

11.The ping of death is a type of man-in-the-middle attack.
False

12.A computer system is attacked for one of two general reasons: it is specifically targeted by the attacker or it is a target of opportunity.
True

13.A __________ is a software or hardware device that is used to observe traffic as it passes through a network on shared broadcast media.
network sniffer

14.What type of attack is based on the automated download of malware that takes advantage of a browsers’ ability to download the different files that compose a web page?
Drive-by download

15.Which term refers to a form of malware that is specifically designed to modify the operation of the operating system in some fashion to facilitate nonstandard functionality?
Rootkit

16.Perpetrating some sort of electronic fraud is one reason a specific system might be targeted for attack.
True

17.Bob gets an e-mail addressed from his bank, asking for his user ID and password. He then notices that the e-mail has poor grammar and incorrect spelling. He calls up his bank to ask if they sent the e-mail, and they promptly tell him they did not and would not ask for that kind of information. What is this type of attack called?
Phishing

18.The term __________ refers to software that has been designed for some nefarious purpose.
malware

19.What type of software records and reports activities of the user (typically without their knowledge)?
Spyware

20.An attacker purposely sends a program more data for input than it was designed to handle. What type of attack does this represent?
Buffer overflow

21.S/MIME uses the X.509 format for certificates.
True

22.In technical terms, the application on the sender’s machine is referred to as a(n) __________.
mail user agent (MUA)

23.Which TCP port does SMTP use by default?
25

24.Because Outlook supports Visual Basic scripting, it is vulnerable to e-mail __________.
Worms

25.Which of the following is a primary e-mail protocol?
SMTP

26.E-mail hoaxes are similar to chain letters in promising a reward.
False

27.Few instant messaging programs currently support __________.
encryption

28.All mail servers support spam URI Real-time Block Lists (SURBLs) technology.
False

29.Which TCP port does IMAP use by default?
143

30.Two tools that can be used to encrypt e-mail content are __________.
PGP and S/MIME

Other Links:



Statistics Quiz




Networking Quiz




See other websites for quiz:



Check on QUIZLET







Leave a Reply

Your email address will not be published. Required fields are marked *