Why is this considered to be a very limited security measure?
Access control is often implemented through the use of MAC address filtering on wireless Access
Points. Why is this considered to be a very limited security measure?
what must be developed?
In order to show improvement of security over time, what must be developed?
What kind of attack is this?
In order to attack a wireless network, you put up an access point and override the signal of the real
access point. As users send authentication data, you are able to capture it. What kind of attack is
this?
which phase?
In the software security development life cyle process, threat modeling occurs in which phase?
Why are SSID not considered to be a good security mechanism to protect a wireless networks?
On wireless networks, SSID is used to identify the network. Why are SSID not considered to be a
good security mechanism to protect a wireless networks?
Which of the following items of a computer system will an anti-virus program scan for viruses?
Which of the following items of a computer system will an anti-virus program scan for viruses?
What other steps does Bob have to take in order to successfully implement this?
Bob reads an article about how insecure wireless networks can be. He gets approval from his
management to implement a policy of not allowing any wireless devices on the network. What
other steps does Bob have to take in order to successfully implement this? (Select 2 answer.)
Which of the following can take an arbitrary length of input and produce a message digest output of 160 bit?
Which of the following can take an arbitrary length of input and produce a message digest output
of 160 bit?
What authentication mechanism is being followed here?
Jackson discovers that the wireless AP transmits 128 bytes of plaintext, and the station responds
by encrypting the plaintext. It then transmits the resulting ciphertext using the same key and cipher
that are used by WEP to encrypt subsequent network traffic. What authentication mechanism is
being followed here?
Which cryptography attack is the student attempting?
A computer science student needs to fill some information into a secured Adobe PDF job
application that was received from a prospective employer. Instead of requesting a new document
that allowed the forms to be completed, the student decides to write a script that pulls passwords
from a list of commonly used passwords to try against the secured PDF until the correct password
is found or the list is exhausted.
Which cryptography attack is the student attempting?