“........is an attack type for a rogue Wi-Fi access point that appears to be a legitimate one offered on
“........is an attack type for a rogue Wi-Fi access point that appears to be a legitimate one offered on the premises, but actually has been set up to eavesdrop on wireless communications. It is the wireless version of the phishing scam. An attacker fools wireless users into connecting a laptop...
Which of the following is assured by the use of a hash?
Which of the following is assured by the use of a hash?A . AuthenticationB . ConfidentialityC . AvailabilityD . IntegrityView AnswerAnswer: D
Which of the following tools is used to detect wireless LANs using the 802.11a/b/g/n WLAN standards on a linux platform?
Which of the following tools is used to detect wireless LANs using the 802.11a/b/g/n WLAN standards on a linux platform?A . KismetB . AbelC . NetstumblerD . NessusView AnswerAnswer: A Explanation: https://en.wikipedia.org/wiki/Kismet_(software) Kismet is a network detector, packet sniffer, and intrusion detection system for 802.11 wireless LANs. Kismet will work...
Which of the following describes the characteristics of a Boot Sector Virus?
Which of the following describes the characteristics of a Boot Sector Virus?A . Modifies directory table entries so that directory entries point to the virus code instead of the actual program.B . Moves the MBR to another location on the RAM and copies itself to the original location of the...
What is not a PCI compliance recommendation?
What is not a PCI compliance recommendation?A . Use a firewall between the public network and the payment card data.B . Use encryption to protect all transmission of card holder data over any public network.C . Rotate employees handling credit card transactions on a yearly basis to different departments.D ....
Which method of password cracking takes the most time and effort?
Which method of password cracking takes the most time and effort?A . Dictionary attackB . Shoulder surfingC . Rainbow tablesD . Brute forceView AnswerAnswer: D Explanation: Brute-force attack when an attacker uses a set of predefined values to attack a target and analyze the response until he succeeds. Success depends...
What is not a PCI compliance recommendation?
What is not a PCI compliance recommendation?A . Use a firewall between the public network and the payment card data.B . Use encryption to protect all transmission of card holder data over any public network.C . Rotate employees handling credit card transactions on a yearly basis to different departments.D ....
What kind of vulnerability must be present to make this remote attack possible?
A network administrator discovers several unknown files in the root directory of his Linux FTP server. One of the files is a tarball, two are shell script files, and the third is a binary file is named "nc." The FTP server's access logs show that the anonymous user account logged...
What is not a PCI compliance recommendation?
What is not a PCI compliance recommendation?A . Use a firewall between the public network and the payment card data.B . Use encryption to protect all transmission of card holder data over any public network.C . Rotate employees handling credit card transactions on a yearly basis to different departments.D ....
What is not a PCI compliance recommendation?
What is not a PCI compliance recommendation?A . Use a firewall between the public network and the payment card data.B . Use encryption to protect all transmission of card holder data over any public network.C . Rotate employees handling credit card transactions on a yearly basis to different departments.D ....