Chapter 4 Quiz - Chapter 4 Quiz Review of attempt 1 Started...

Info iconThis preview shows pages 1–4. Sign up to view the full content.

View Full Document Right Arrow Icon
Chapter 4 Quiz Review of attempt 1 Started on Sunday, 5 June 2011, 02:21 AM Completed on Sunday, 5 June 2011, 03:09 AM Time taken 48 mins 56 secs Grade 97 out of a maximum of 100 ( 97 %) Question 1 Marks: 2 Common network device vulnerabilities include weak passwords, default accounts, back doors, and privilege escalation. Choose one answer. a. True b. False Correct Marks for this submission: 2/2. Question 2 Marks: 4 ____________________ is impersonation; that is, it is pretending to be someone or something else by presenting false information. Answer: Correct Marks for this submission: 4/4. Question 3 Marks: 3 An attacker could alter the MAC address in the ARP cache so that the corresponding IP address would point to a different computer, which is known as ____. Choose one answer. a. DNS spoofing b. DNS poisoning c. ARP transfer d. ARP poisoning
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Correct Marks for this submission: 3/3. Question 4 Marks: 4 A(n) ____________________ is sent to a device to force it to temporarily disconnect from the wireless network. Answer: Correct Marks for this submission: 4/4. Question 5 Marks: 3 With wireless CSMA/CA, the amount of time that a device must wait after the medium is clear is called the ____. Choose one answer. a. collision time b. slot time c. clear time d. tx time Correct Marks for this submission: 3/3. Question 6 Marks: 3 Wireless location mapping is the formal expression for ____. Choose one answer. a. wireless scanning b. wireless caching c. war driving d. wireless beaconing Correct Marks for this submission: 3/3. Question 7
Background image of page 2
Marks: 2 DoS attacks are limited to wired networks and cannot be used against wireless networks. Choose one answer. a. True b. False Correct Marks for this submission: 2/2. Question 8 Marks: 4 A(n) ____________________ (also called a sniffer) captures each packet to decode and analyze its contents. Answer: Correct Marks for this submission: 4/4. Question 9
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 4
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 07/10/2011 for the course SEC 100 taught by Professor Tuner during the Spring '11 term at Solano Community College.

Page1 / 11

Chapter 4 Quiz - Chapter 4 Quiz Review of attempt 1 Started...

This preview shows document pages 1 - 4. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online