An attacker who uses Bluetooth to copy e mails contact lists, or other files on a device is

Chapter 12

1. What is wireless networking?

A. The transmission of packetized data by means of fiber optic cable

B. The transmission of packetized data via the internet

C. The transmission of packetized data by means of physical topology not using direct physical links

D. The transmission of packetized data by means of private bands

2. Why is wireless problematic from a security standpoint?

A. There is no control over physical limitations.

B. Insufficient signal strength

C. There is no control over the physical layer of traffic.

D. There is no control over the network.

3. WTLS implements integrity through the use of __________.

A. DES

B. 3DES

C. MACs

D. DACs

4. The so-called WAP gap involves the __________ of information where the two different networks meet, the WAP gateways.

A. integrity

B. confidentiality

C. authentication

D. WTLS

5. Which term refers to a set of wireless technologies that enables smartphones and other devices to establish radio communication over a short proximity?

A. Orthogonal frequency division band (OFDB)

B. Direct-sequence spread spectrum (DSSS)

C. Near field communication (NFC)

D. 802.11i

6. One standard for sending packetized data traffic over radio waves in the unlicensed 2.4 GHz band is __________.

A. WAP

B. WTLS

C. 802.11b

D. 804.11b

7. Which network security standard was created to provide users with an easy method of configuring wireless networks?

A. Wireless Transport Layer Security (WTLS)

B. Wi-Fi Protected Setup (WPS)

C. Protected EAP (PEAP)

D. Wireless Application Protocol (WAP)

8. Which type of attack occurs when the attacker captures a portion of a communication between two parties and retransmits it at a later time?

A. Evil twin

B. Denial of service

C. Replay

D. Man-in-the-middle

9. An attacker who uses Bluetooth to copy emails, contact lists, or other files on a device is __________.

A. Bluejacking

B. Bluesnarfing

C. Bluebugging

D. Bluehacking

10. Which term refers to a process by which the user escalates their privilege level, bypassing the operating system's controls and limitations?

A. Jailbreaking

B. Segmentation

C. BYOD

D. Off-boarding

TRUE / FALSE

11. ZigBee is a low-power, personal area networking technology described by the IEEE 802.15.4 series.

12. Alert messages in Wireless Transport Layer Security (WTLS) are sometimes sent in plaintext and not authenticated.

13. The primary reason that spread-spectrum technology is used in 802.11 protocols is to provide security.

14. EAP is a framework to secure the authentication process.

Answer & Explanation

Solved by verified expert

  1. molestie consequat, ultrices ac magna. Fusce dui lectus, congue vel laoreet ac, dictum vitae odio. D
  2. facilisis. Pellentesque dapibus efficitur laoreet. Nam ri
  3. icitur
  4. nec facilisis. Pe
  5. nec facilisis. Pellentesque dapi
  6. onec aliqu
  7. s ante, dapibus a molestie co
  8. s ante, d
  9. ipiscing elit.
  10. rem ipsum dolo
  11. cing
  12. cing
  13. pulv
  14. ur l

Unlock full access to Course Hero

Explore over 16 million step-by-step answers from our library

Subscribe to view answer

Step-by-step explanation

  1. a. Fusce dui lectus, congue vel laoreet ac, dictum vitae odio. Donec aliquet. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Nam lacinia pulvinar tortor nec
  2. ultrices ac magna. Fusce dui lectus, congue vel laoreet ac, dictum vitae odio. Donec aliquet. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Nam lacinia pulvina
  3. or nec facilisis. Pellentesque dapibus efficitur laoreet. Nam risus ante, dapibus
  4. facilisis. Pellentesque dapibus efficitur laoreet. Nam risus ante, dapibus a molestie consequat,
  5. cing elit. Nam lacinia pulvinar tortor nec facilisis. Pellentesque dapibus efficitur laoreet. N
  6. a. Fusce dui lectus, congue vel laoreet ac, dictum vitae odio. Donec aliquet. Lorem ipsum dolor sit amet, consectetur
  7. pulvinar tortor nec facilisis. Pellentesque dapibus efficitur laoreet. Nam r
  8. e vel laoreet ac, dictum vitae odio. Donec aliquet. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Nam lacinia pulvinar tortor nec fac
  9. icitur laoreet. Nam risus ante, dapibus a molestie consequat, ultrices ac magna. Fu
  10. et, consectetur adipiscing elit. Nam lacinia pulvinar tortor nec facilisis. Pellentesque dapibus efficitur laoreet. Nam ri
  11. Fusce dui lectus, congue vel laoreet ac, dictum vitae odio. Donec aliquet. Lorem ipsum dolor sit a
  12. onec aliquet. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Nam lacinia pulvinar tortor nec facilisis. Pell
  13. cing elit. Nam lacinia pulvinar tortor nec facilisis. Pellentesque dapibus efficitur laoreet. Nam risus ante, dapi
  14. ongue vel laoreet ac, dictum vitae odio. Donec aliquet. Lorem ipsum dolor sit amet, consect
  15. a molestie

    e vel laoreet ac, dictum vitae odio. Donec aliquet. Lorem ips

    amet, consectetur adipiscing elit. Nam lacinia pulvinar tortor nec facilisis.

    fficitur laoreet. Nam risus ante, dapibus a molestie consequat, ultrices ac magna. Fusce dui lectus, congue vel lao

    iscing elit. Nam lacinia pulvinar tortor nec facilisis. Pellentesque dapibus efficitur laoreet.

    e vel laoreet ac, dictum vitae odio. Donec aliquet. Lorem ips

    a. Fusce dui lectus, congue vel laoreet ac, dictum vitae odio. Donec aliquet. Lorem ipsum dolor sit amet, consectetur adi

    nec facilisis. Pellentesque dapibus efficitur laoreet. Nam risus ante, dapibu

    ongue vel laoreet ac, dictum vitae odio. Donec aliquet. Lore

    icitur laoreet. Nam risus ante, dapibus a molestie consequat, ul

    et, consectetur adipiscing elit. Nam lacinia pulvinar tortor nec facilisis. Pellentesque dapibus efficitur laoreet.

When an attacker uses Bluetooth to copy e mails contact lists or other files on the device it is called?

20 Cards in this Set. WEP provides strong protection for confidentiality. Bluejacking is when an attacker uses Bluetooth to copy the victim's information such as e-mails, contact lists, calendars, photos, and videos.

Which technique involves sending an unauthorized message to another Bluetooth device?

What is bluejacking? Bluejacking is a term used for the sending of unauthorized messages to another Bluetooth device.

Which protocol is a short range wireless protocol typically used on small devices such as mobile phones?

Bluetooth is a standard protocol for short-range radio communications between many different types of devices, including mobile phones, computers, entertainment systems and other electronics.

What does WAP use for its encryption scheme?

This involves communication over both wireless and wireline channels. With WAP, data is encrypted during over-the-air transport using Wireless Transport Layer Security (WTLS) protocol, and over-the-wire transport using Internet security protocols such as SSL and TLS.

Chủ đề