Deck 7: Telecommunication and Broadband Communication Penetration Testing

ملء الشاشة (f)
exit full mode
سؤال
A(n) ____ is a hardware device or software running on a computer that monitors the network traffic passing through it and denies or allows traffic based on previously defined rules and configurations.

A) router
B) piconet
C) infrared port
D) firewall
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
The term ____ refers to software that extends the capabilities of the browser (e.g., the ability to download and display video, hear audio, or play animations).

A) browser plug-in
B) router
C) cookie
D) firewall
سؤال
The term ____ refers to a technology developed by Microsoft that allows software applets to be reused in various applications.

A) java
B) ActiveX
C) Spyware
D) Service set identifier
سؤال
The term ____ refers to a piece of information sent by a Web site to the browser when the site is accessed.

A) cache
B) buffer
C) cookie
D) browser plug-in
سؤال
The term ____ refers to stealthy computer monitoring software that allows an attacker to secretly record all activities of a targeted user over the network.

A) spyware
B) broadband
C) Bluetooth
D) DSL
سؤال
Monitoring telephone and Internet communications without the knowledge of the target is called ____.

A) wiretapping
B) pairing
C) stack fingerprinting
D) wardriving
سؤال
____ is the act of locating and possibly exploiting connections to wireless local area networks while driving around a geographic location.

A) Wiretapping
B) Wardriving
C) Stack fingerprinting
D) Pairing
سؤال
A(n) ____ is a network tunneled through other networks, dedicated to specific communications.

A) virtual private network
B) storage area network
C) metropolitan area network
D) local area network
سؤال
____ is a security protocol used in many wireless local area networks.

A) SNMP
B) SMTP
C) WEP
D) SSID
سؤال
The term ____ refers to the sequence of characters that is attached to each packet transmitted on a wireless network and identifies that network.

A) parity bit
B) WEP key
C) checksum
D) service set identifier
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/10
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 7: Telecommunication and Broadband Communication Penetration Testing
1
A(n) ____ is a hardware device or software running on a computer that monitors the network traffic passing through it and denies or allows traffic based on previously defined rules and configurations.

A) router
B) piconet
C) infrared port
D) firewall
firewall
2
The term ____ refers to software that extends the capabilities of the browser (e.g., the ability to download and display video, hear audio, or play animations).

A) browser plug-in
B) router
C) cookie
D) firewall
browser plug-in
3
The term ____ refers to a technology developed by Microsoft that allows software applets to be reused in various applications.

A) java
B) ActiveX
C) Spyware
D) Service set identifier
ActiveX
4
The term ____ refers to a piece of information sent by a Web site to the browser when the site is accessed.

A) cache
B) buffer
C) cookie
D) browser plug-in
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 10 في هذه المجموعة.
فتح الحزمة
k this deck
5
The term ____ refers to stealthy computer monitoring software that allows an attacker to secretly record all activities of a targeted user over the network.

A) spyware
B) broadband
C) Bluetooth
D) DSL
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 10 في هذه المجموعة.
فتح الحزمة
k this deck
6
Monitoring telephone and Internet communications without the knowledge of the target is called ____.

A) wiretapping
B) pairing
C) stack fingerprinting
D) wardriving
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 10 في هذه المجموعة.
فتح الحزمة
k this deck
7
____ is the act of locating and possibly exploiting connections to wireless local area networks while driving around a geographic location.

A) Wiretapping
B) Wardriving
C) Stack fingerprinting
D) Pairing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 10 في هذه المجموعة.
فتح الحزمة
k this deck
8
A(n) ____ is a network tunneled through other networks, dedicated to specific communications.

A) virtual private network
B) storage area network
C) metropolitan area network
D) local area network
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 10 في هذه المجموعة.
فتح الحزمة
k this deck
9
____ is a security protocol used in many wireless local area networks.

A) SNMP
B) SMTP
C) WEP
D) SSID
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 10 في هذه المجموعة.
فتح الحزمة
k this deck
10
The term ____ refers to the sequence of characters that is attached to each packet transmitted on a wireless network and identifies that network.

A) parity bit
B) WEP key
C) checksum
D) service set identifier
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 10 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 10 في هذه المجموعة.