Wireless Security 1

 &n

21 cards   |   Total Attempts: 188
  

Cards In This Set

Front Back
In technical terms, ____ describes the points of risk regarding the penetration of a security defense.
Security vulnerability
Before users can be given access to a computer and its data, they must in some way prove that they are who they claim to be. This process of providing proof is known as ____.
Authentication
In a ____ attack, an attacker attempts to create every possible password combination by systematically changing one character at a time in a password.
Brute force
In a ____ attack, each word from a dictionary is encoded in the same way the computer encodes a user’s password for protection. Attackers then compare the encoded dictionary words against those in the encoded password file
Dictionary
The ____ is a popular protocol used to manage networked equipment.
SNMP
____ allows the Windows operating system to automatically detect new hardware when it is installed on a computer.
PnP
____ is a service that allows devices on a network to discover other devices and determine how to work with them.
UPnP
A computer ____ is a program that secretly attaches itself to another document or program and executes when that document or program is opened.
Virus
A ____ is a computer program that lies dormant until it is triggered by a specific event.
Logic bomb
____ is a general term used to describe software that violates a user’s personal security.
Spyware
____ occurs when an individual uses the personal information of someone else to impersonate that individual with the intent to commit fraud or other crimes.
Identity theft
One of the spyware tools often used is ____.
Spam
____ typically displays advertising banners or pop-up ads and is frequently encountered while visiting Web sites with a browser.
Spam
A ____ bypasses all of the network security and opens the entire network and all users to direct attacks.
Rogue access point
A ____ attack is designed to prevent a device from performing its intended function.
Denial-of-service (DoS)