Term
The most common frequency band used in the household is 4.2 GHz. |
|
Definition
|
|
Term
With IPsec, security associations are used to establish the logical set of security parameters designed to facilitate the sharing of information between entities. The security association protects |
|
Definition
Integrity and confidentiality |
|
|
Term
The main weakness of SSH is that all traffic is sent in the clear. |
|
Definition
|
|
Term
When an attacker uses Bluetooth to copy e-mails, contact lists, or other files on the device, it is called |
|
Definition
|
|
Term
The cryptographic standard for proposed for 3G networks is |
|
Definition
|
|
Term
Which of the following protocols involves a three-way handshake and uses a shared secret key for communication? |
|
Definition
|
|
Term
Bluejacking is when an attacker uses Bluetooth to copy the victim's information such as e-mails, contact lists, calendars, photos, and videos |
|
Definition
|
|
Term
______________ is when an attacker uses Bluetooth to establish a serious connection to a device allowing access to the full AT command set |
|
Definition
|
|
Term
Which type of access control would be used to grant permissions based on the duties that must be performed? |
|
Definition
Role-based access control |
|
|
Term
The security concern over the so-called WAP gap is when |
|
Definition
WAP gateways perform translation from one encryption standard to another all messages are seen in plaintext by the WAP gateway. |
|
|
Term
The primary vulnerability associated with many methods of remote access is |
|
Definition
The passing of critical data in clear text |
|
|
Term
WEP was not designed with confidentiality in mind. |
|
Definition
|
|
Term
WAP was designed to work on which of the following? |
|
Definition
Devices with low computing power |
|
|
Term
|
Definition
Authentication, Authorization, Accounting |
|
|
Term
A door that requires a thumbprint, key card, and password is an example of |
|
Definition
Multifactor authentication |
|
|
Term
Which of the following protocols involves a two-way handshake in which the username and password are sent across the link in clear text? |
|
Definition
|
|
Term
_____________ means to make certain that no unauthorized individuals read the packets you transmit over the Internet |
|
Definition
|
|
Term
Telnet traffic is encrypted by default. |
|
Definition
|
|
Term
What does TACACS stand for? |
|
Definition
Terminal Access Controller Access Control System |
|
|
Term
Security issues associated with WTLS include which of the following? |
|
Definition
d. Clients with low memory or CPU capabilities cannot support encryption. |
|
|
Term
Access to actual Ethernet segments is not protected by physical security measures. |
|
Definition
|
|
Term
Telnet is a secure way to remotely access a computer. |
|
Definition
|
|
Term
Because the security of wireless LANs is ineffective, many users have switched to a layered security approach. |
|
Definition
|
|
Term
|
Definition
c. UDP port 1812 for authentication and UDP port 1813 for accounting |
|
|
Term
What is wireless networking? |
|
Definition
c. The transmission of packetized data by means of physical topology not using direct physical links |
|
|
Term
|
Definition
c. Can be used separately or together |
|
|
Term
With mandatory access controls, the owner of an object determines who has access to it. |
|
Definition
|
|
Term
Which type of access control would you use to grant permissions based on the sensitivity of the information contained in the objects? |
|
Definition
a. Mandatory access control |
|
|
Term
______________ means reliable information. |
|
Definition
|
|
Term
WAP uses _______________ for its encryption scheme. |
|
Definition
|
|
Term
TACACS+ is a client/server protocol that uses IP as its transport protocol. |
|
Definition
|
|
Term
Which of the following protocols was designed for short-range wireless communication typically with mobile phones? |
|
Definition
|
|
Term
WEP was not designed with confidentiality in mind. |
|
Definition
|
|
Term
Why is wireless problematic from a security standpoint? |
|
Definition
c. There is no control over the physical layer of traffic. |
|
|
Term
WEP provides strong protection for confidentiality. |
|
Definition
|
|
Term
In Kerberos environment, the first ticket in the two-step process is the ticket-granting ticket. |
|
Definition
|
|
Term
Which of the following describes the wireless standard? |
|
Definition
|
|
Term
TACACS+ is a client/server protocol that uses IP as its transport protocol. |
|
Definition
|
|