Deck 4: Active Wireless Attacks

ملء الشاشة (f)
exit full mode
سؤال
An incorrect configuration of wireless hardware or software can often result in easy access to a system.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
____ occurs when an individual uses the personal information of someone else to impersonate that individual with the intent to commit fraud or other crimes.

A) Identity theft
B) Spam
C) DoS attack
D) Phishing
سؤال
DoS attacks are rare against wired network servers.
سؤال
Before users can be given access to a computer and its data, they must in some way prove that they are who they claim to be. This process of providing proof is known as ____.

A) authorization
B) encryption
C) cryptography
D) authentication
سؤال
In a ____ attack, each word from a dictionary is encoded in the same way the computer encodes a user's password for protection. Attackers then compare the encoded dictionary words against those in the encoded password file.

A) DoS
B) brute force
C) dictionary
D) rogue AP
سؤال
Authentication can be performed based on what you have, what you know, or what you are.
سؤال
The ____ is a popular protocol used to manage networked equipment.

A) SMTP
B) SNMP
C) FTP
D) POP3
سؤال
____ is a service that allows devices on a network to discover other devices and determine how to work with them.

A) IPSec
B) SNMP
C) UPnP
D) PnP
سؤال
____ typically displays advertising banners or pop-up ads and is frequently encountered while visiting Web sites with a browser.

A) Logic bomb
B) Adware
C) Spam
D) Phishing
سؤال
____ is a general term used to describe software that violates a user's personal security.

A) Virus
B) Spyware
C) Worm
D) Logic bomb
سؤال
A computer ____ is a program that secretly attaches itself to another document or program and executes when that document or program is opened.

A) virus
B) worm
C) spam
D) logic bomb
سؤال
In a ____ attack, an attacker attempts to create every possible password combination by systematically changing one character at a time in a password.

A) dictionary
B) brute force
C) DoS
D) rogue AP
سؤال
A ____ bypasses all of the network security and opens the entire network and all users to direct attacks.

A) wireless router
B) firewall
C) rogue access point
D) wireless gateway
سؤال
A ____ attack is designed to prevent a device from performing its intended function.

A) denial-of-service (DoS)
B) rogue AP
C) phishing
D) pharming
سؤال
A ____ is a computer program that lies dormant until it is triggered by a specific event.

A) worm
B) virus
C) spam
D) logic bomb
سؤال
In technical terms, ____ describes the points of risk regarding the penetration of a security defense.

A) security vulnerability
B) dictionary attack
C) password guessing
D) IPSec
سؤال
Because CSMA/CA has all stations wait a random amount of time after the medium is clear, the number of collisions is significantly reduced.
سؤال
____ allows the Windows operating system to automatically detect new hardware when it is installed on a computer.

A) UPnP
B) SNMP
C) IPSec
D) PnP
سؤال
One of the spyware tools often used is ____.

A) DoS
B) spam
C) adware
D) rogue APs
سؤال
Logic bombs are easy to detect before they are triggered.
سؤال
The Anti-Spyware Coalition defines ____________________ as technologies that are implemented in ways that impair a user's control over the use of system resources.
سؤال
With wireless CSMA/CA the amount of time that a device must wait after the medium is clear is called the ____________________.
سؤال
A(n) ____________________ may be defined as a weakness or flaw in an information system that could be exploited to cause harm.
سؤال
Most successful wireless DoS attacks are performed at the ____ layer of the OSI model.

A) Physical
B) MAC
C) Network
D) Application
سؤال
What are the minimum criteria for creating good passwords?
سؤال
What are the problems with using default passwords?
سؤال
Because the wireless medium is shared among all devices, there must be rules for cooperation among the wireless devices. The 802.11 standard uses a procedure known as ____.

A) ISM
B) CSMA/CD
C) CSMA/CA
D) IPSec
سؤال
What are some of the characteristics of weak passwords?
سؤال
What are some of the symptoms that indicate a virus has infected a computer?
سؤال
A ____ program creates fake packets and flood the wireless network.

A) MAC
B) packet sniffer
C) packet generator
D) CSMA/CA
سؤال
____ attacks are designed to deny wireless devices access to the access point itself.

A) DoS
B) Phishing
C) Rogue AP
D) Wireless DoS
سؤال
With explicit ____, an acknowledgment frame (abbreviated ACK) is sent by the receiving device back to the sending device to confirm that the data frame arrived intact.

A) packet generator
B) slot time
C) CRC
D) frame acknowledgment
سؤال
What are the security problems related to supporting remote access in wireless gateways?
سؤال
What are the security problems related to adware?
سؤال
____________________ are devices that combine access point, router, and network address translation features.
سؤال
____ attacks flood the RF spectrum with enough radiomagnetic interference to prevent a device from effectively communicating with the AP.

A) Physical layer
B) MAC layer
C) LLC layer
D) Transport layer
سؤال
Once an attacker's wireless device has entered the network and focused its attacks at other similar devices this is known as a(n) ____________________.
سؤال
Briefly explain the password paradox.
سؤال
What are the problems of using community strings in SNMP?
سؤال
Briefly describe the Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) procedure.
سؤال
Briefly describe how to perform a wired network DoS attack.
سؤال
Match between columns
determines the number of unique new passwords a user must use before an old password can be reused.
Spam
determines the number of unique new passwords a user must use before an old password can be reused.
CAN-SPAM
determines the number of unique new passwords a user must use before an old password can be reused.
Adware
determines the number of unique new passwords a user must use before an old password can be reused.
Password
determines the number of unique new passwords a user must use before an old password can be reused.
Malware
determines the number of unique new passwords a user must use before an old password can be reused.
Minimum password age
determines the number of unique new passwords a user must use before an old password can be reused.
Password history
determines the number of unique new passwords a user must use before an old password can be reused.
Maximum password age
determines the number of unique new passwords a user must use before an old password can be reused.
CSMA/CA
a secret combination of letters and numbers that serves to validate or authenticate a user by what he knows.
Spam
a secret combination of letters and numbers that serves to validate or authenticate a user by what he knows.
CAN-SPAM
a secret combination of letters and numbers that serves to validate or authenticate a user by what he knows.
Adware
a secret combination of letters and numbers that serves to validate or authenticate a user by what he knows.
Password
a secret combination of letters and numbers that serves to validate or authenticate a user by what he knows.
Malware
a secret combination of letters and numbers that serves to validate or authenticate a user by what he knows.
Minimum password age
a secret combination of letters and numbers that serves to validate or authenticate a user by what he knows.
Password history
a secret combination of letters and numbers that serves to validate or authenticate a user by what he knows.
Maximum password age
a secret combination of letters and numbers that serves to validate or authenticate a user by what he knows.
CSMA/CA
unsolicited e-mail.
Spam
unsolicited e-mail.
CAN-SPAM
unsolicited e-mail.
Adware
unsolicited e-mail.
Password
unsolicited e-mail.
Malware
unsolicited e-mail.
Minimum password age
unsolicited e-mail.
Password history
unsolicited e-mail.
Maximum password age
unsolicited e-mail.
CSMA/CA
term used to describe computer programs designed to break into and create havoc on portable or desktop computers.
Spam
term used to describe computer programs designed to break into and create havoc on portable or desktop computers.
CAN-SPAM
term used to describe computer programs designed to break into and create havoc on portable or desktop computers.
Adware
term used to describe computer programs designed to break into and create havoc on portable or desktop computers.
Password
term used to describe computer programs designed to break into and create havoc on portable or desktop computers.
Malware
term used to describe computer programs designed to break into and create havoc on portable or desktop computers.
Minimum password age
term used to describe computer programs designed to break into and create havoc on portable or desktop computers.
Password history
term used to describe computer programs designed to break into and create havoc on portable or desktop computers.
Maximum password age
term used to describe computer programs designed to break into and create havoc on portable or desktop computers.
CSMA/CA
attempts to prevent multiple wireless devices from transmitting at the same time.
Spam
attempts to prevent multiple wireless devices from transmitting at the same time.
CAN-SPAM
attempts to prevent multiple wireless devices from transmitting at the same time.
Adware
attempts to prevent multiple wireless devices from transmitting at the same time.
Password
attempts to prevent multiple wireless devices from transmitting at the same time.
Malware
attempts to prevent multiple wireless devices from transmitting at the same time.
Minimum password age
attempts to prevent multiple wireless devices from transmitting at the same time.
Password history
attempts to prevent multiple wireless devices from transmitting at the same time.
Maximum password age
attempts to prevent multiple wireless devices from transmitting at the same time.
CSMA/CA
how many days a password can be used before the user is required to change it.
Spam
how many days a password can be used before the user is required to change it.
CAN-SPAM
how many days a password can be used before the user is required to change it.
Adware
how many days a password can be used before the user is required to change it.
Password
how many days a password can be used before the user is required to change it.
Malware
how many days a password can be used before the user is required to change it.
Minimum password age
how many days a password can be used before the user is required to change it.
Password history
how many days a password can be used before the user is required to change it.
Maximum password age
how many days a password can be used before the user is required to change it.
CSMA/CA
U.S. law against spam.
Spam
U.S. law against spam.
CAN-SPAM
U.S. law against spam.
Adware
U.S. law against spam.
Password
U.S. law against spam.
Malware
U.S. law against spam.
Minimum password age
U.S. law against spam.
Password history
U.S. law against spam.
Maximum password age
U.S. law against spam.
CSMA/CA
determines how many days a user must keep new passwords before they can change them.
Spam
determines how many days a user must keep new passwords before they can change them.
CAN-SPAM
determines how many days a user must keep new passwords before they can change them.
Adware
determines how many days a user must keep new passwords before they can change them.
Password
determines how many days a user must keep new passwords before they can change them.
Malware
determines how many days a user must keep new passwords before they can change them.
Minimum password age
determines how many days a user must keep new passwords before they can change them.
Password history
determines how many days a user must keep new passwords before they can change them.
Maximum password age
determines how many days a user must keep new passwords before they can change them.
CSMA/CA
software that delivers advertising content in a manner or context that is unexpected and unwanted by the user.
Spam
software that delivers advertising content in a manner or context that is unexpected and unwanted by the user.
CAN-SPAM
software that delivers advertising content in a manner or context that is unexpected and unwanted by the user.
Adware
software that delivers advertising content in a manner or context that is unexpected and unwanted by the user.
Password
software that delivers advertising content in a manner or context that is unexpected and unwanted by the user.
Malware
software that delivers advertising content in a manner or context that is unexpected and unwanted by the user.
Minimum password age
software that delivers advertising content in a manner or context that is unexpected and unwanted by the user.
Password history
software that delivers advertising content in a manner or context that is unexpected and unwanted by the user.
Maximum password age
software that delivers advertising content in a manner or context that is unexpected and unwanted by the user.
CSMA/CA
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/42
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 4: Active Wireless Attacks
1
An incorrect configuration of wireless hardware or software can often result in easy access to a system.
True
2
____ occurs when an individual uses the personal information of someone else to impersonate that individual with the intent to commit fraud or other crimes.

A) Identity theft
B) Spam
C) DoS attack
D) Phishing
A
3
DoS attacks are rare against wired network servers.
False
4
Before users can be given access to a computer and its data, they must in some way prove that they are who they claim to be. This process of providing proof is known as ____.

A) authorization
B) encryption
C) cryptography
D) authentication
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
5
In a ____ attack, each word from a dictionary is encoded in the same way the computer encodes a user's password for protection. Attackers then compare the encoded dictionary words against those in the encoded password file.

A) DoS
B) brute force
C) dictionary
D) rogue AP
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
6
Authentication can be performed based on what you have, what you know, or what you are.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
7
The ____ is a popular protocol used to manage networked equipment.

A) SMTP
B) SNMP
C) FTP
D) POP3
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
8
____ is a service that allows devices on a network to discover other devices and determine how to work with them.

A) IPSec
B) SNMP
C) UPnP
D) PnP
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
9
____ typically displays advertising banners or pop-up ads and is frequently encountered while visiting Web sites with a browser.

A) Logic bomb
B) Adware
C) Spam
D) Phishing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
10
____ is a general term used to describe software that violates a user's personal security.

A) Virus
B) Spyware
C) Worm
D) Logic bomb
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
11
A computer ____ is a program that secretly attaches itself to another document or program and executes when that document or program is opened.

A) virus
B) worm
C) spam
D) logic bomb
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
12
In a ____ attack, an attacker attempts to create every possible password combination by systematically changing one character at a time in a password.

A) dictionary
B) brute force
C) DoS
D) rogue AP
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
13
A ____ bypasses all of the network security and opens the entire network and all users to direct attacks.

A) wireless router
B) firewall
C) rogue access point
D) wireless gateway
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
14
A ____ attack is designed to prevent a device from performing its intended function.

A) denial-of-service (DoS)
B) rogue AP
C) phishing
D) pharming
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
15
A ____ is a computer program that lies dormant until it is triggered by a specific event.

A) worm
B) virus
C) spam
D) logic bomb
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
16
In technical terms, ____ describes the points of risk regarding the penetration of a security defense.

A) security vulnerability
B) dictionary attack
C) password guessing
D) IPSec
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
17
Because CSMA/CA has all stations wait a random amount of time after the medium is clear, the number of collisions is significantly reduced.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
18
____ allows the Windows operating system to automatically detect new hardware when it is installed on a computer.

A) UPnP
B) SNMP
C) IPSec
D) PnP
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
19
One of the spyware tools often used is ____.

A) DoS
B) spam
C) adware
D) rogue APs
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
20
Logic bombs are easy to detect before they are triggered.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
21
The Anti-Spyware Coalition defines ____________________ as technologies that are implemented in ways that impair a user's control over the use of system resources.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
22
With wireless CSMA/CA the amount of time that a device must wait after the medium is clear is called the ____________________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
23
A(n) ____________________ may be defined as a weakness or flaw in an information system that could be exploited to cause harm.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
24
Most successful wireless DoS attacks are performed at the ____ layer of the OSI model.

A) Physical
B) MAC
C) Network
D) Application
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
25
What are the minimum criteria for creating good passwords?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
26
What are the problems with using default passwords?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
27
Because the wireless medium is shared among all devices, there must be rules for cooperation among the wireless devices. The 802.11 standard uses a procedure known as ____.

A) ISM
B) CSMA/CD
C) CSMA/CA
D) IPSec
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
28
What are some of the characteristics of weak passwords?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
29
What are some of the symptoms that indicate a virus has infected a computer?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
30
A ____ program creates fake packets and flood the wireless network.

A) MAC
B) packet sniffer
C) packet generator
D) CSMA/CA
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
31
____ attacks are designed to deny wireless devices access to the access point itself.

A) DoS
B) Phishing
C) Rogue AP
D) Wireless DoS
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
32
With explicit ____, an acknowledgment frame (abbreviated ACK) is sent by the receiving device back to the sending device to confirm that the data frame arrived intact.

A) packet generator
B) slot time
C) CRC
D) frame acknowledgment
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
33
What are the security problems related to supporting remote access in wireless gateways?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
34
What are the security problems related to adware?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
35
____________________ are devices that combine access point, router, and network address translation features.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
36
____ attacks flood the RF spectrum with enough radiomagnetic interference to prevent a device from effectively communicating with the AP.

A) Physical layer
B) MAC layer
C) LLC layer
D) Transport layer
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
37
Once an attacker's wireless device has entered the network and focused its attacks at other similar devices this is known as a(n) ____________________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
38
Briefly explain the password paradox.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
39
What are the problems of using community strings in SNMP?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
40
Briefly describe the Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) procedure.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
41
Briefly describe how to perform a wired network DoS attack.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
42
Match between columns
determines the number of unique new passwords a user must use before an old password can be reused.
Spam
determines the number of unique new passwords a user must use before an old password can be reused.
CAN-SPAM
determines the number of unique new passwords a user must use before an old password can be reused.
Adware
determines the number of unique new passwords a user must use before an old password can be reused.
Password
determines the number of unique new passwords a user must use before an old password can be reused.
Malware
determines the number of unique new passwords a user must use before an old password can be reused.
Minimum password age
determines the number of unique new passwords a user must use before an old password can be reused.
Password history
determines the number of unique new passwords a user must use before an old password can be reused.
Maximum password age
determines the number of unique new passwords a user must use before an old password can be reused.
CSMA/CA
a secret combination of letters and numbers that serves to validate or authenticate a user by what he knows.
Spam
a secret combination of letters and numbers that serves to validate or authenticate a user by what he knows.
CAN-SPAM
a secret combination of letters and numbers that serves to validate or authenticate a user by what he knows.
Adware
a secret combination of letters and numbers that serves to validate or authenticate a user by what he knows.
Password
a secret combination of letters and numbers that serves to validate or authenticate a user by what he knows.
Malware
a secret combination of letters and numbers that serves to validate or authenticate a user by what he knows.
Minimum password age
a secret combination of letters and numbers that serves to validate or authenticate a user by what he knows.
Password history
a secret combination of letters and numbers that serves to validate or authenticate a user by what he knows.
Maximum password age
a secret combination of letters and numbers that serves to validate or authenticate a user by what he knows.
CSMA/CA
unsolicited e-mail.
Spam
unsolicited e-mail.
CAN-SPAM
unsolicited e-mail.
Adware
unsolicited e-mail.
Password
unsolicited e-mail.
Malware
unsolicited e-mail.
Minimum password age
unsolicited e-mail.
Password history
unsolicited e-mail.
Maximum password age
unsolicited e-mail.
CSMA/CA
term used to describe computer programs designed to break into and create havoc on portable or desktop computers.
Spam
term used to describe computer programs designed to break into and create havoc on portable or desktop computers.
CAN-SPAM
term used to describe computer programs designed to break into and create havoc on portable or desktop computers.
Adware
term used to describe computer programs designed to break into and create havoc on portable or desktop computers.
Password
term used to describe computer programs designed to break into and create havoc on portable or desktop computers.
Malware
term used to describe computer programs designed to break into and create havoc on portable or desktop computers.
Minimum password age
term used to describe computer programs designed to break into and create havoc on portable or desktop computers.
Password history
term used to describe computer programs designed to break into and create havoc on portable or desktop computers.
Maximum password age
term used to describe computer programs designed to break into and create havoc on portable or desktop computers.
CSMA/CA
attempts to prevent multiple wireless devices from transmitting at the same time.
Spam
attempts to prevent multiple wireless devices from transmitting at the same time.
CAN-SPAM
attempts to prevent multiple wireless devices from transmitting at the same time.
Adware
attempts to prevent multiple wireless devices from transmitting at the same time.
Password
attempts to prevent multiple wireless devices from transmitting at the same time.
Malware
attempts to prevent multiple wireless devices from transmitting at the same time.
Minimum password age
attempts to prevent multiple wireless devices from transmitting at the same time.
Password history
attempts to prevent multiple wireless devices from transmitting at the same time.
Maximum password age
attempts to prevent multiple wireless devices from transmitting at the same time.
CSMA/CA
how many days a password can be used before the user is required to change it.
Spam
how many days a password can be used before the user is required to change it.
CAN-SPAM
how many days a password can be used before the user is required to change it.
Adware
how many days a password can be used before the user is required to change it.
Password
how many days a password can be used before the user is required to change it.
Malware
how many days a password can be used before the user is required to change it.
Minimum password age
how many days a password can be used before the user is required to change it.
Password history
how many days a password can be used before the user is required to change it.
Maximum password age
how many days a password can be used before the user is required to change it.
CSMA/CA
U.S. law against spam.
Spam
U.S. law against spam.
CAN-SPAM
U.S. law against spam.
Adware
U.S. law against spam.
Password
U.S. law against spam.
Malware
U.S. law against spam.
Minimum password age
U.S. law against spam.
Password history
U.S. law against spam.
Maximum password age
U.S. law against spam.
CSMA/CA
determines how many days a user must keep new passwords before they can change them.
Spam
determines how many days a user must keep new passwords before they can change them.
CAN-SPAM
determines how many days a user must keep new passwords before they can change them.
Adware
determines how many days a user must keep new passwords before they can change them.
Password
determines how many days a user must keep new passwords before they can change them.
Malware
determines how many days a user must keep new passwords before they can change them.
Minimum password age
determines how many days a user must keep new passwords before they can change them.
Password history
determines how many days a user must keep new passwords before they can change them.
Maximum password age
determines how many days a user must keep new passwords before they can change them.
CSMA/CA
software that delivers advertising content in a manner or context that is unexpected and unwanted by the user.
Spam
software that delivers advertising content in a manner or context that is unexpected and unwanted by the user.
CAN-SPAM
software that delivers advertising content in a manner or context that is unexpected and unwanted by the user.
Adware
software that delivers advertising content in a manner or context that is unexpected and unwanted by the user.
Password
software that delivers advertising content in a manner or context that is unexpected and unwanted by the user.
Malware
software that delivers advertising content in a manner or context that is unexpected and unwanted by the user.
Minimum password age
software that delivers advertising content in a manner or context that is unexpected and unwanted by the user.
Password history
software that delivers advertising content in a manner or context that is unexpected and unwanted by the user.
Maximum password age
software that delivers advertising content in a manner or context that is unexpected and unwanted by the user.
CSMA/CA
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.