Term
| The most common frequency band used in the household is 4.2 GHz. |
|
Definition
|
|
Term
| With IPsec, security associations are used to establish the logical set of security parameters designed to facilitate the sharing of information between entities. The security association protects |
|
Definition
| Integrity and confidentiality |
|
|
Term
| The main weakness of SSH is that all traffic is sent in the clear. |
|
Definition
|
|
Term
| When an attacker uses Bluetooth to copy e-mails, contact lists, or other files on the device, it is called |
|
Definition
|
|
Term
| The cryptographic standard for proposed for 3G networks is |
|
Definition
|
|
Term
| Which of the following protocols involves a three-way handshake and uses a shared secret key for communication? |
|
Definition
|
|
Term
| Bluejacking is when an attacker uses Bluetooth to copy the victim's information such as e-mails, contact lists, calendars, photos, and videos |
|
Definition
|
|
Term
| ______________ is when an attacker uses Bluetooth to establish a serious connection to a device allowing access to the full AT command set |
|
Definition
|
|
Term
| Which type of access control would be used to grant permissions based on the duties that must be performed? |
|
Definition
| Role-based access control |
|
|
Term
| The security concern over the so-called WAP gap is when |
|
Definition
| WAP gateways perform translation from one encryption standard to another all messages are seen in plaintext by the WAP gateway. |
|
|
Term
| The primary vulnerability associated with many methods of remote access is |
|
Definition
| The passing of critical data in clear text |
|
|
Term
| WEP was not designed with confidentiality in mind. |
|
Definition
|
|
Term
| WAP was designed to work on which of the following? |
|
Definition
| Devices with low computing power |
|
|
Term
|
Definition
| Authentication, Authorization, Accounting |
|
|
Term
| A door that requires a thumbprint, key card, and password is an example of |
|
Definition
| Multifactor authentication |
|
|
Term
| Which of the following protocols involves a two-way handshake in which the username and password are sent across the link in clear text? |
|
Definition
|
|
Term
| _____________ means to make certain that no unauthorized individuals read the packets you transmit over the Internet |
|
Definition
|
|
Term
| Telnet traffic is encrypted by default. |
|
Definition
|
|
Term
| What does TACACS stand for? |
|
Definition
| Terminal Access Controller Access Control System |
|
|
Term
| Security issues associated with WTLS include which of the following? |
|
Definition
| d. Clients with low memory or CPU capabilities cannot support encryption. |
|
|
Term
| Access to actual Ethernet segments is not protected by physical security measures. |
|
Definition
|
|
Term
| Telnet is a secure way to remotely access a computer. |
|
Definition
|
|
Term
| Because the security of wireless LANs is ineffective, many users have switched to a layered security approach. |
|
Definition
|
|
Term
|
Definition
| c. UDP port 1812 for authentication and UDP port 1813 for accounting |
|
|
Term
| What is wireless networking? |
|
Definition
| c. The transmission of packetized data by means of physical topology not using direct physical links |
|
|
Term
|
Definition
| c. Can be used separately or together |
|
|
Term
| With mandatory access controls, the owner of an object determines who has access to it. |
|
Definition
|
|
Term
| Which type of access control would you use to grant permissions based on the sensitivity of the information contained in the objects? |
|
Definition
| a. Mandatory access control |
|
|
Term
| ______________ means reliable information. |
|
Definition
|
|
Term
| WAP uses _______________ for its encryption scheme. |
|
Definition
|
|
Term
| TACACS+ is a client/server protocol that uses IP as its transport protocol. |
|
Definition
|
|
Term
| Which of the following protocols was designed for short-range wireless communication typically with mobile phones? |
|
Definition
|
|
Term
| WEP was not designed with confidentiality in mind. |
|
Definition
|
|
Term
| Why is wireless problematic from a security standpoint? |
|
Definition
| c. There is no control over the physical layer of traffic. |
|
|
Term
| WEP provides strong protection for confidentiality. |
|
Definition
|
|
Term
| In Kerberos environment, the first ticket in the two-step process is the ticket-granting ticket. |
|
Definition
|
|
Term
| Which of the following describes the wireless standard? |
|
Definition
|
|
Term
| TACACS+ is a client/server protocol that uses IP as its transport protocol. |
|
Definition
|
|