Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 3

url hijacking refers to registering mis spelled domain name closely

resembling other well known popular domain names to get internet


traffic from users making errors typing url in browser
true
modifying code that changes external behaviour for compatibility
between newer os and older version of app software?
Shimming
Practise of optimizing existing computer code without changing its
external behaviour
Refactoring
Software hardware driver manipulation that might be used to enable
malware injection
Shimming
Refactoring
Ip spoofing and mac spoofing rely on falsifying address type?
Broadcast
Security protocol least susceptible to wireless replay attack?
Wpa2 ccmp
Type of wireless attack designed to exploit vulnerabilities of wep
Iv attack
Evil twin refers to rogue ap with same name and ssid of ap it is
duplicating
True
Wireless jamming attacks is
Dos attack
Solution simplifies config of new wireless networks by allowing non
technical users to easily config network security settings and add
devices to existing network?
Wpa
Wireless tech deprecated shouldn’t be used?
Wep wps
Sending unsolicited messages over Bluetooth called?
Blue jacking
Unauthorised access to Bluetooth device referred to as
Bluesnarfing
Wireless tech enables id and tacking of tags attached to objects
Rfid
Contactless payments tech
Nfc
Wireless disassociation is
Dos attack
Cryptographic attack relies on concepts of probability theory
Birthday
Which acronym is cryptographic attack where attacker has access to
both plaintext and its encrypted version
Kpa
Rainbow tables lookup tables used to speed up process of password
guessing
True
Which refers to contents of rainbow table entry
Hash password
Password attack takes advantage of predefined list of words
Dictionary attack
Attack against encrypted data that relies heavily on computing
power to check all possible keys and passwords until correct one is
found
Brute force attack
Bypassing failed log in attempt account lockout policy is capture
relevant data and brute force offline
True
Cryptographic hash functions produce two different digests for same
data input referred as hash collision
False
Cryptographic downgrade attack
Poodle

You might also like