Chapter 4 Quiz - Chapter 4 Quiz Review of attempt 1 Started...

Info icon This preview shows pages 1–4. Sign up to view the full content.

View Full Document Right Arrow Icon
Chapter 4 Quiz Review of attempt 1 Started on Sunday, 5 June 2011, 02:21 AM Completed on Sunday, 5 June 2011, 03:09 AM Time taken 48 mins 56 secs Grade 97 out of a maximum of 100 ( 97 %) Question 1 Marks: 2 Common network device vulnerabilities include weak passwords, default accounts, back doors, and privilege escalation. Choose one answer. a. True b. False Correct Marks for this submission: 2/2. Question 2 Marks: 4 ____________________ is impersonation; that is, it is pretending to be someone or something else by presenting false information. Correct Marks for this submission: 4/4. Question 3 Marks: 3 An attacker could alter the MAC address in the ARP cache so that the corresponding IP address would point to a different computer, which is known as ____. Choose one answer.
Image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Correct Marks for this submission: 3/3. Question 4 Marks: 4 A(n) ____________________ is sent to a device to force it to temporarily disconnect from the wireless network. Answer: Correct Marks for this submission: 4/4. Question 5 Marks: 3 With wireless CSMA/CA, the amount of time that a device must wait after the medium is clear is called the ____. Choose one answer. Correct Marks for this submission: 3/3. Question 6 Marks: 3 Wireless location mapping is the formal expression for ____. Choose one answer. Correct Marks for this submission: 3/3. Question 7
Image of page 2
Marks: 2 DoS attacks are limited to wired networks and cannot be used against wireless networks. Choose one answer. a. True b. False Correct Marks for this submission: 2/2.
Image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Image of page 4
This is the end of the preview. Sign up to access the rest of the document.

{[ snackBarMessage ]}

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern