______________ dictates the overall performance of a wi-fi community. - ANS-customers,
interference, and get entry to factors
______________ is a short-variety wi-fi era. - ANS-Bluetooth
______________ operates at 5GHz. - ANS-802.11a
_______________ blocks structures primarily based on physical deal with. - ANS-MAC
filtering
_______________ facts a consumer's typing. - ANS-adware
_______________ runs completely from removable media. - ANS-A Live CD
_______________ makes use of trusted gadgets. - ANS-Bluetooth
________________ is used to faux a MAC deal with. - ANS-spoofing
_________________ connect to documents. - ANS-viruses
_________________ may be caused by the exploitation of defects and code. - ANS-SQL
injection
_________________ is an example of a hashing set of rules. - ANS-MD5
__________________ is understood to disable shielding mechanisms on a machine along
with antivirus software program, anti-spyware software program, and firewalls, and to record
on a person's activities. - ANS-spyware
__________________ is used to audit databases. - ANS-NGSSquirreL
___________________ are configured to move off at a sure date, time, or whilst a particular
occasion happens. - ANS-good judgment bombs
___________________ are scripting languages (pick two) - ANS-ActiveX and CGI
___________________ can screen changes to machine documents. - ANS-host intrusion
detection structures (HIDSs)
___________________ is designed to intimidate users. - ANS-scareware
___________________ is used to flood a switch with bogus MAC addresses. - ANS-MAC
flooding
___________________ is used to overwhelm a provider. - ANS-hijacking
____________________ is a famous even though easily detectable scanning method. -
ANS-complete join
____________________ is NOT a part of the important thing management process. -
ANS-storage
_____________________ is a effective prevention measure for stopping viruses. -
ANS-schooling
_____________________ is the factor at which an attacker starts to plan his or her attack. -
ANS-reading the consequences
_____________________ is the manner of exploiting services on a system. - ANS-gadget
hacking
________________________ includes growing get entry to on a system. - ANS-privilege
escalation
__________________________ are strategies for transferring statistics in an unsupervised
manner. - ANS-covert channels
__________________________ is properly appropriate for bulk encryption. - ANS-RSA
, ____________________________ is the term for criminals' practice of going thru industrial
or company trash packing containers seeking out facts including touch lists, manuals
memos, calendars, and printouts of vital files. - ANS-dumpster diving
A __________ is used to keep a password. - ANS-hash
A ________________ is a file used to save passwords. - ANS-database
A ___________________ is an offline attack. - ANS-Rainbow assault
A ____________________ can simplest monitor an man or woman community segment. -
ANS-sensor
A ____________________ has the capacity to reveal community pastime. - ANS-network
intrusion detection machine (NIDS)
A ______________________ replaces and alters gadget documents changing the way a
system behaves at a fundamental stage. - ANS-rootkit
A _______________________ is used to expose passwords. - ANS-password cracker
A _______________________ video display units hobby on one host, however cannot
display an entire community. - ANS-host intrusion detection gadget (HIDS)
A birthday attack may be used to try to interrupt _____________________. - ANS-MD5
A buffer overflow can bring about records being corrupted or overwritten. - ANS-TRUE
A database may be a sufferer of supply code exploits. - ANS-FALSE
A DoS assault is meant to disclaim a service from valid usage. - ANS-TRUE
A disadvantage to public key infrastructure (PKI) is that the two events must have previous
expertise of each other in order to set up a dating. - ANS-FALSE
A facility can never have an excessive amount of lights. - ANS-FALSE
A hacker with computing capabilities and information to launch harmful assaults on pc
networks and uses the ones capabilities illegally is exceptional defined as a
_______________________. - ANS-black-hat hacker
A NULL consultation is used to attack to Windows remotely. - ANS-TRUE
A number of various strategies may be used to deface an internet web page. - ANS-TRUE
A one-manner hashing function is designed to be: - ANS-noticeably clean to compute one
manner, but hard to undo or opposite
A persuasion/coercion attack is taken into consideration mental. - ANS-TRUE
A safety publicity in an operating machine or utility software program issue is called a
______________________. - ANS-vulnerability
Active sniffing is used whilst switches are present. - ANS-TRUE
Ad hoc networks may be created right away and effortlessly because no access factor is
needed of their setup. - ANS-TRUE
An ad hoc network scales well in manufacturing environments. - ANS-FALSE
An attacker can use a ___________________ to go back to a machine. - ANS-backdoor
An attacker using friendliness, consider, impersonation, and empathy to get a sufferer to do
what they need her or him to do is participating in ________________________________. -
ANS-persuasion/coercion
An attacker who gains the accept as true with of a potential victim to the point in which the
sufferer volunteers statistics before the attacker attempts to get it's far stated to have
succeeded at what? - ANS-reverse social engineering
An IPS is designed to look for and prevent attacks. - ANS-TRUE
An XMAS tree test units all the following flags besides __________________. - ANS-SYN
Anomaly based IDSs search for deviations from ordinary community hobby. - ANS-TRUE
Atmospheric situations, building materials, and nearby gadgets can all have an effect on
emanations of wireless networks. - ANS-TRUE