Deck 8: Communication Media
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/14
العب
ملء الشاشة (f)
Deck 8: Communication Media
1
Kismet identifies networks by passively collecting packets, detecting standard named networks, detecting (and given time, decloaking) hidden networks, and inferring the presence of nonbeaconing networks via data traffic.
True
2
Narrowband communications are data signals that are spread across a wider frequency bandwidth of the radio channel than spread spectrum.
False
3
A username is often stored in an unencrypted file or the Windows registry, making it easily accessible to anyone with access to the user's computer.
True
4
____ is an iPhone jailbreaking program for Windows that unlocks any SIM card using the anySIM.app.
A) anySIM
B) iNdependence
C) iDemocracy
D) iActivator
A) anySIM
B) iNdependence
C) iDemocracy
D) iActivator
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 14 في هذه المجموعة.
فتح الحزمة
k this deck
5
____ can restore an iPhone to its read-only state.
A) anySIM
B) iNdependence
C) iDemocracy
D) iActivator
A) anySIM
B) iNdependence
C) iDemocracy
D) iActivator
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 14 في هذه المجموعة.
فتح الحزمة
k this deck
6
A ____ is a hexadecimal security code that protects Wi-Fi networks.
A) parity bit
B) WEP key
C) checksum
D) service set identifier
A) parity bit
B) WEP key
C) checksum
D) service set identifier
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 14 في هذه المجموعة.
فتح الحزمة
k this deck
7
All wireless devices that communicate with each other have the same ____.
A) parity bit
B) WEP key
C) checksum
D) service set identifier
A) parity bit
B) WEP key
C) checksum
D) service set identifier
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 14 في هذه المجموعة.
فتح الحزمة
k this deck
8
Match each item with a statement below:
-PhoneSweep
A) Attackers initiate sequential calls to a block of telephone numbers in order to identify vulnerabilities.
B) Has features that are designed to facilitate covert use, such as a "boss key" that replaces the computer's screen with an incongruous bitmap and ceases all dialing operations.
C) Once installed, it identifies computers running remote access software to bypass the corporate firewall.
D) Tool used for running ICMP ping sweeps.
-PhoneSweep
A) Attackers initiate sequential calls to a block of telephone numbers in order to identify vulnerabilities.
B) Has features that are designed to facilitate covert use, such as a "boss key" that replaces the computer's screen with an incongruous bitmap and ceases all dialing operations.
C) Once installed, it identifies computers running remote access software to bypass the corporate firewall.
D) Tool used for running ICMP ping sweeps.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 14 في هذه المجموعة.
فتح الحزمة
k this deck
9
Match each item with a statement below:
-THC-Scan
A) Attackers initiate sequential calls to a block of telephone numbers in order to identify vulnerabilities.
B) Has features that are designed to facilitate covert use, such as a "boss key" that replaces the computer's screen with an incongruous bitmap and ceases all dialing operations.
C) Once installed, it identifies computers running remote access software to bypass the corporate firewall.
D) Tool used for running ICMP ping sweeps.
-THC-Scan
A) Attackers initiate sequential calls to a block of telephone numbers in order to identify vulnerabilities.
B) Has features that are designed to facilitate covert use, such as a "boss key" that replaces the computer's screen with an incongruous bitmap and ceases all dialing operations.
C) Once installed, it identifies computers running remote access software to bypass the corporate firewall.
D) Tool used for running ICMP ping sweeps.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 14 في هذه المجموعة.
فتح الحزمة
k this deck
10
Match each item with a statement below:
-Call walking attack
A) Attackers initiate sequential calls to a block of telephone numbers in order to identify vulnerabilities.
B) Has features that are designed to facilitate covert use, such as a "boss key" that replaces the computer's screen with an incongruous bitmap and ceases all dialing operations.
C) Once installed, it identifies computers running remote access software to bypass the corporate firewall.
D) Tool used for running ICMP ping sweeps.
-Call walking attack
A) Attackers initiate sequential calls to a block of telephone numbers in order to identify vulnerabilities.
B) Has features that are designed to facilitate covert use, such as a "boss key" that replaces the computer's screen with an incongruous bitmap and ceases all dialing operations.
C) Once installed, it identifies computers running remote access software to bypass the corporate firewall.
D) Tool used for running ICMP ping sweeps.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 14 في هذه المجموعة.
فتح الحزمة
k this deck
11
Match each item with a statement below:
-Nessus
A) Attackers initiate sequential calls to a block of telephone numbers in order to identify vulnerabilities.
B) Has features that are designed to facilitate covert use, such as a "boss key" that replaces the computer's screen with an incongruous bitmap and ceases all dialing operations.
C) Once installed, it identifies computers running remote access software to bypass the corporate firewall.
D) Tool used for running ICMP ping sweeps.
-Nessus
A) Attackers initiate sequential calls to a block of telephone numbers in order to identify vulnerabilities.
B) Has features that are designed to facilitate covert use, such as a "boss key" that replaces the computer's screen with an incongruous bitmap and ceases all dialing operations.
C) Once installed, it identifies computers running remote access software to bypass the corporate firewall.
D) Tool used for running ICMP ping sweeps.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 14 في هذه المجموعة.
فتح الحزمة
k this deck
12
What are the steps involved in performing a wireless assessment?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 14 في هذه المجموعة.
فتح الحزمة
k this deck
13
Provide a brief description of each of the following types of antennas: aperture, reflector, monopole, and yagi.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 14 في هذه المجموعة.
فتح الحزمة
k this deck
14
What is the difference between an IKE-Scan and an IKEProbe?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 14 في هذه المجموعة.
فتح الحزمة
k this deck

