1.Which term refers to a set of wireless technologies that enables smartphones and other devices to establish radio communication over a short proximity?
Near field communication (NFC)
2.An advantage of Wired Equivalent Privacy (WEP) is that it can be trusted alone to provide confidentiality.
False
3.Which attack technique involves sending an unauthorized message to another Bluetooth device?
Bluejacking
4.The primary reason that spread-spectrum technology is used in 802.11 protocols is to provide security.
False
5.ZigBee is a low-power, personal area networking technology described by the IEEE 802.15.4 series.
True
6.802.11a operates in the __________ spectrum using orthogonal frequency division multiplexing (OFDM).
5-GHz
7.Why is wireless problematic from a security standpoint?
There is no control over the physical layer of traffic.
8.Alert messages in Wireless Transport Layer Security (WTLS) are sometimes sent in plaintext and not authenticated.
True
9.Which term refers to a specific technique of using an HTTP client to handle authentication on a wireless network?
Captive portal
10.The cryptographic standard proposed for 3G networks is known as __________.
KASUMI
11.The ping of death is a type of man-in-the-middle attack.
False
12.A computer system is attacked for one of two general reasons: it is specifically targeted by the attacker or it is a target of opportunity.
True
13.A __________ is a software or hardware device that is used to observe traffic as it passes through a network on shared broadcast media.
network sniffer
14.What type of attack is based on the automated download of malware that takes advantage of a browsers’ ability to download the different files that compose a web page?
Drive-by download
15.Which term refers to a form of malware that is specifically designed to modify the operation of the operating system in some fashion to facilitate nonstandard functionality?
Rootkit
16.Perpetrating some sort of electronic fraud is one reason a specific system might be targeted for attack.
True
17.Bob gets an e-mail addressed from his bank, asking for his user ID and password. He then notices that the e-mail has poor grammar and incorrect spelling. He calls up his bank to ask if they sent the e-mail, and they promptly tell him they did not and would not ask for that kind of information. What is this type of attack called?
Phishing
18.The term __________ refers to software that has been designed for some nefarious purpose.
malware
19.What type of software records and reports activities of the user (typically without their knowledge)?
Spyware
20.An attacker purposely sends a program more data for input than it was designed to handle. What type of attack does this represent?
Buffer overflow
21.S/MIME uses the X.509 format for certificates.
True
22.In technical terms, the application on the sender’s machine is referred to as a(n) __________.
mail user agent (MUA)
23.Which TCP port does SMTP use by default?
25
24.Because Outlook supports Visual Basic scripting, it is vulnerable to e-mail __________.
Worms
25.Which of the following is a primary e-mail protocol?
SMTP
26.E-mail hoaxes are similar to chain letters in promising a reward.
False
27.Few instant messaging programs currently support __________.
encryption
28.All mail servers support spam URI Real-time Block Lists (SURBLs) technology.
False
29.Which TCP port does IMAP use by default?
143
30.Two tools that can be used to encrypt e-mail content are __________.
PGP and S/MIME
Other Links:
Statistics Quiz
Networking Quiz
See other websites for quiz:
Check on QUIZLET