Deck 8: Communication Media

ملء الشاشة (f)
exit full mode
سؤال
Kismet identifies networks by passively collecting packets, detecting standard named networks, detecting (and given time, decloaking) hidden networks, and inferring the presence of nonbeaconing networks via data traffic.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
Narrowband communications are data signals that are spread across a wider frequency bandwidth of the radio channel than spread spectrum.
سؤال
A username is often stored in an unencrypted file or the Windows registry, making it easily accessible to anyone with access to the user's computer.
سؤال
____ is an iPhone jailbreaking program for Windows that unlocks any SIM card using the anySIM.app.

A) anySIM
B) iNdependence
C) iDemocracy
D) iActivator
سؤال
____ can restore an iPhone to its read-only state.

A) anySIM
B) iNdependence
C) iDemocracy
D) iActivator
سؤال
A ____ is a hexadecimal security code that protects Wi-Fi networks.

A) parity bit
B) WEP key
C) checksum
D) service set identifier
سؤال
All wireless devices that communicate with each other have the same ____.

A) parity bit
B) WEP key
C) checksum
D) service set identifier
سؤال
Match each item with a statement below:

-PhoneSweep

A) Attackers initiate sequential calls to a block of telephone numbers in order to identify vulnerabilities.
B) Has features that are designed to facilitate covert use, such as a "boss key" that replaces the computer's screen with an incongruous bitmap and ceases all dialing operations.
C) Once installed, it identifies computers running remote access software to bypass the corporate firewall.
D) Tool used for running ICMP ping sweeps.
سؤال
Match each item with a statement below:

-THC-Scan

A) Attackers initiate sequential calls to a block of telephone numbers in order to identify vulnerabilities.
B) Has features that are designed to facilitate covert use, such as a "boss key" that replaces the computer's screen with an incongruous bitmap and ceases all dialing operations.
C) Once installed, it identifies computers running remote access software to bypass the corporate firewall.
D) Tool used for running ICMP ping sweeps.
سؤال
Match each item with a statement below:

-Call walking attack

A) Attackers initiate sequential calls to a block of telephone numbers in order to identify vulnerabilities.
B) Has features that are designed to facilitate covert use, such as a "boss key" that replaces the computer's screen with an incongruous bitmap and ceases all dialing operations.
C) Once installed, it identifies computers running remote access software to bypass the corporate firewall.
D) Tool used for running ICMP ping sweeps.
سؤال
Match each item with a statement below:

-Nessus

A) Attackers initiate sequential calls to a block of telephone numbers in order to identify vulnerabilities.
B) Has features that are designed to facilitate covert use, such as a "boss key" that replaces the computer's screen with an incongruous bitmap and ceases all dialing operations.
C) Once installed, it identifies computers running remote access software to bypass the corporate firewall.
D) Tool used for running ICMP ping sweeps.
سؤال
What are the steps involved in performing a wireless assessment?
سؤال
Provide a brief description of each of the following types of antennas: aperture, reflector, monopole, and yagi.
سؤال
What is the difference between an IKE-Scan and an IKEProbe?
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/14
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 8: Communication Media
1
Kismet identifies networks by passively collecting packets, detecting standard named networks, detecting (and given time, decloaking) hidden networks, and inferring the presence of nonbeaconing networks via data traffic.
True
2
Narrowband communications are data signals that are spread across a wider frequency bandwidth of the radio channel than spread spectrum.
False
3
A username is often stored in an unencrypted file or the Windows registry, making it easily accessible to anyone with access to the user's computer.
True
4
____ is an iPhone jailbreaking program for Windows that unlocks any SIM card using the anySIM.app.

A) anySIM
B) iNdependence
C) iDemocracy
D) iActivator
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 14 في هذه المجموعة.
فتح الحزمة
k this deck
5
____ can restore an iPhone to its read-only state.

A) anySIM
B) iNdependence
C) iDemocracy
D) iActivator
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 14 في هذه المجموعة.
فتح الحزمة
k this deck
6
A ____ is a hexadecimal security code that protects Wi-Fi networks.

A) parity bit
B) WEP key
C) checksum
D) service set identifier
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 14 في هذه المجموعة.
فتح الحزمة
k this deck
7
All wireless devices that communicate with each other have the same ____.

A) parity bit
B) WEP key
C) checksum
D) service set identifier
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 14 في هذه المجموعة.
فتح الحزمة
k this deck
8
Match each item with a statement below:

-PhoneSweep

A) Attackers initiate sequential calls to a block of telephone numbers in order to identify vulnerabilities.
B) Has features that are designed to facilitate covert use, such as a "boss key" that replaces the computer's screen with an incongruous bitmap and ceases all dialing operations.
C) Once installed, it identifies computers running remote access software to bypass the corporate firewall.
D) Tool used for running ICMP ping sweeps.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 14 في هذه المجموعة.
فتح الحزمة
k this deck
9
Match each item with a statement below:

-THC-Scan

A) Attackers initiate sequential calls to a block of telephone numbers in order to identify vulnerabilities.
B) Has features that are designed to facilitate covert use, such as a "boss key" that replaces the computer's screen with an incongruous bitmap and ceases all dialing operations.
C) Once installed, it identifies computers running remote access software to bypass the corporate firewall.
D) Tool used for running ICMP ping sweeps.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 14 في هذه المجموعة.
فتح الحزمة
k this deck
10
Match each item with a statement below:

-Call walking attack

A) Attackers initiate sequential calls to a block of telephone numbers in order to identify vulnerabilities.
B) Has features that are designed to facilitate covert use, such as a "boss key" that replaces the computer's screen with an incongruous bitmap and ceases all dialing operations.
C) Once installed, it identifies computers running remote access software to bypass the corporate firewall.
D) Tool used for running ICMP ping sweeps.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 14 في هذه المجموعة.
فتح الحزمة
k this deck
11
Match each item with a statement below:

-Nessus

A) Attackers initiate sequential calls to a block of telephone numbers in order to identify vulnerabilities.
B) Has features that are designed to facilitate covert use, such as a "boss key" that replaces the computer's screen with an incongruous bitmap and ceases all dialing operations.
C) Once installed, it identifies computers running remote access software to bypass the corporate firewall.
D) Tool used for running ICMP ping sweeps.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 14 في هذه المجموعة.
فتح الحزمة
k this deck
12
What are the steps involved in performing a wireless assessment?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 14 في هذه المجموعة.
فتح الحزمة
k this deck
13
Provide a brief description of each of the following types of antennas: aperture, reflector, monopole, and yagi.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 14 في هذه المجموعة.
فتح الحزمة
k this deck
14
What is the difference between an IKE-Scan and an IKEProbe?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 14 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 14 في هذه المجموعة.