In Linux and UNIX, what user account has rights over the whole system?
Ans✓✓✓ root
In the functioning of TKIP, what value is used as a session-based WEP key in the
second phase? Ans✓✓✓ TTAK
In which technique does an attacker acquire a trusted address that allows the
attacker to communicate with the access point? Ans✓✓✓ MAC Sniffing
In which type of network can every computer communicate directly with the
other computers on the same network without going through an access point?
Ans✓✓✓ Peer-to-peer
This officer primarily looks into network security and related issues: Ans✓✓✓
Information systems analyst
What can you do to access a router to see if its firewall is configured? Ans✓✓✓
Use telnet to open a connection on port 23
What can you run from a command shell to identify a router? Ans✓✓✓
traceroute
What can you use to monitor a Simple Mail Transfer Protocol (SMTP) server
regularly after connecting to it? Ans✓✓✓ SLCheck
, What do APs use to broadcast the SSID so users can locate the network?
Ans✓✓✓ Beacon frames
What is the common name for the WPAN defined by IEEE 802.15.1? Ans✓✓✓
Bluetooth
What is the name of the lowest possible folder in the Linux file system hierarchy?
Ans✓✓✓ root
What is the packet filtering program used by Linux since kernel version 2.4?
Ans✓✓✓ IPTables
What is used to define the packet structures that are collected through
promiscuous monitoring? Ans✓✓✓ Packet decoding
What is used to verify a user's identity and security clearance? Ans✓✓✓
Authentication
What method for securing laptops uses a barcode and an indelible tattoo to mark
laptops and other equipment with an identifier that can be traced anywhere in
the world? Ans✓✓✓ STOP plates
What procedure is used to translate information into code for secure
transmission? Ans✓✓✓ Encryption
What type of attack at the IP layer allows an attacker to attempt arbitrary attacks
against hosts on a network, without the IDS ever realizing it? Ans✓✓✓ Evasion