url hijacking refers to registering mis spelled domain name closely
resembling other well known popular domain names to get internet
traffic from users making errors typing url in browser true modifying code that changes external behaviour for compatibility between newer os and older version of app software? Shimming Practise of optimizing existing computer code without changing its external behaviour Refactoring Software hardware driver manipulation that might be used to enable malware injection Shimming Refactoring Ip spoofing and mac spoofing rely on falsifying address type? Broadcast Security protocol least susceptible to wireless replay attack? Wpa2 ccmp Type of wireless attack designed to exploit vulnerabilities of wep Iv attack Evil twin refers to rogue ap with same name and ssid of ap it is duplicating True Wireless jamming attacks is Dos attack Solution simplifies config of new wireless networks by allowing non technical users to easily config network security settings and add devices to existing network? Wpa Wireless tech deprecated shouldn’t be used? Wep wps Sending unsolicited messages over Bluetooth called? Blue jacking Unauthorised access to Bluetooth device referred to as Bluesnarfing Wireless tech enables id and tacking of tags attached to objects Rfid Contactless payments tech Nfc Wireless disassociation is Dos attack Cryptographic attack relies on concepts of probability theory Birthday Which acronym is cryptographic attack where attacker has access to both plaintext and its encrypted version Kpa Rainbow tables lookup tables used to speed up process of password guessing True Which refers to contents of rainbow table entry Hash password Password attack takes advantage of predefined list of words Dictionary attack Attack against encrypted data that relies heavily on computing power to check all possible keys and passwords until correct one is found Brute force attack Bypassing failed log in attempt account lockout policy is capture relevant data and brute force offline True Cryptographic hash functions produce two different digests for same data input referred as hash collision False Cryptographic downgrade attack Poodle