CMIT 321 Quiz 5 - Which of the following is true about the 802

University of Maryland, University College CMIT 321 quiz 5
CMIT 321 combined Quiz 5
Top of Form
CMIT 321 Quiz 5 score 84%
Question 1 (5 points)
Which of the following is true about the 802.11i standard?
Question 1 options:
It operates at both 2.4 GHZ and 5 GHZ
It operates at 2.4 GHZ only
It defines WPA-2 Enterprise and Personal
It operates at 5 GHZ only
Save
Which of the following tools will allow you crack WPA Passphrases and WEP keys? (Choose one)
Question 1 options:
Airodump-ng
Packetforge-ng
Aircrack-ng
Airdecap-ng
Question 2 (5 points)
Which of the following are part of the aircrack-ng suite? (Choose all that apply)
Question 2 options:
Packetforge-ng
Aircrack-ng
Airdecap-ng
Airodump-ng
Save
Question 3 (5 points)
The MAC Address of an access point is referred to as the ____.
Question 3 options:
OFDM
SSID
BSSID
ESSID
Question 4 (5 points)
You are testing a web application for SQL injection vulnerabilities. You send various SQL statements with return results on the screen. What kind of SQL injection attacking are you performing.
Question 4 options:
Blind SQL injection
Regular SQL injection
SQLEXEC
Stored procedure attack
Question 5 (5 points)
You have been hired to perform a web application security test. The Web site that you are testing uses dynamic content that connects to back-end database. If you wanted to test for SQL injection. What is the first character that you should use to test for input vulnerabilities?
Question 5 options:
Pair of hyphens
Semi colon
Single quote
Phonesnoop is a (Choose all that apply):
Question 6 options:
Wi-Fi hack
Bluetooth hack
Andriod hack
Blackberry hack
Question 7 (5 points)
In this Blue tooth attack, the attacker takes control of the device:
Question 7 options:
Bluesmacking
Blue Bugging
Blue Cracking
Blue Snarfing
Question 8 (5 points)
To help prevent SQL injection attacks all ____ should be validated before transmitting it to the server.
Question 8 options:
TCP packets
Sessions IDs
User input
passwords
Question 9 (5 points)
SQL Databases include (Choose all that apply):
Question 9 options:
MS Access
My SQL
Oracle
Microsoft SQL
Which of the following is a tool that will allow you decrypt traffic?
Question 10 options:
Packetforge-ng
Airdecap-ng
Airodump-ng
Aircrack-ng
Wi-Fi Chalking includes which of the following? (choose all that apply)
Question 11 options:
War Chalking
War Walking
War Driving
War Flying
Save
Previous Page
Next Page
Page 11 of 20
Question 12 (5 points)
This transmission method of digital data uses a pseudo random noise spreading code:
Question 12 options:
FHSS
DSSS
IR
OFDM
Question 13 (5 points)
This tool will allow you to capture packets:
Question 13 options:
Packetforge-ng
Aircrack-ng
Airdecap-ng
Airodump-ng
Save
Question 14 (5 points)
This antenna is based on the principal of a satellite dish and can pick up Wi-Fi signals from 10 miles away:
Question 14 options:
Dipole
Yagi
Parabolic
Omni Directional
This SQL command can be used to retrieve targeted rows and columns by specifying row and column names.
Question 15 options:
UNION
GET
Stored procedure
SELECT
Save
An SSID (select all that apply):
Question 16 options:
Will be encrypted in WEP or WPA/WPA2 is utilized
Is Case Sensitive
Is part of the frame header
Can be up to 32 characters
Save
Question 17 (5 points)
A validation control mechanism that is used to check for SQL-specific metacharacters such as single quotes or double dashes.
Question 17 options:
Exceptions
Store procedure
Regular expressions
SQL filter
Question 18 (5 points)
Using the ___ function an attacker can inject SQL statements into MYSQL without using double quotes.
Question 18 options:
Benchmark
Sleep
SQLEXC
Char
Question 19 (5 points)
Which of the following uses Orthogonal Frequency Division Multiplexing? (choose all that apply)
Question 19 options:
802.11g
802.11a
802.11b
802.11n
uestion 20 (5 points)
This Blue tooth attack tries to get sensitive data:
Question 20 options:
Bluesmacking
Blue Cracking
Blue Snarfing
Blue Bugging
Question 2 (5 points)
Which of the following is a tool that will allow you decrypt traffic?
Question 2 options:
Aircrack-ng
Packetforge-ng
Airodump-ng
Airdecap-ng
Save
Question 3 (5 points)
Blue Tooth attacks include (Choose all that apply):
Question 3 options:
Blue Snarfing
Blue Bugging
Bluesmacking
Blue Cracking
Save
Question 4 (5 points)
The MAC Address of an access point is referred to as the ____.
Question 4 options:
ESSID
BSSID
OFDM
SSID
Save
Question 5 (5 points)
Which of the following tools will allow you crack WPA Passphrases and WEP keys? (Choose one)
Question 5 options:
Airdecap-ng
Airodump-ng
Aircrack-ng
Packetforge-ng
Save
Question 6 (5 points)
Which version of Wired Equivalent Privacy (WEP) uses a 104-bit key size?
Question 6 options:
128 bit WEP
64 bit WEP
256 bit WEP
152 bit WEP
Save
Question 7 (5 points)
An SSID (select all that apply):
Question 7 options:
Is part of the frame header
Will be encrypted if WEP or WPA/WPA2 is utilized
Is Case Sensitive
Can be up to 32 characters
Save
Question 8 (5 points)
Blue Tooth modes include (Choose all that apply):
Question 8 options:
Airplane
Pairable
Non-pairable
Hotspot
Save
Question 9 (5 points)
SQL Databases include (Choose all that apply):
Question 9 options:
MS Access
Oracle
My SQL
Microsoft SQL
Save
Question 10 (5 points)
Wi-Fi Chalking includes which of the following? (choose all that apply)
Question 10 options:
War Walking
War Chalking
War Driving
War Flying
Save
Question 11 (5 points)
Which of the following are part of the aircrack-ng suite? (Choose all that apply)
Question 11 options:
Packetforge-ng
Aircrack-ng
Airdecap-ng
Airodump-ng
Save
Question 12 (5 points)
This Blue tooth attack occurs because an oversized ping packet:
Question 12 options:
Blue Bugging
Blue Cracking
Bluesmacking
Blue Snarfing
Save
Question 13 (5 points)
According to the text, by 2018, what percent of enterprises will specify Wi-Fi as the default connection?
Question 13 options:
60%
40%
75%
25%
Save
Question 14 (5 points)
An SSID is NOT (Choose one )?
Question 14 options:
Case Sensitive
up to 32 characters
encrypted if WEP or WPA/WPA2 is utilized
part of the frame header
Save
Question 15 (5 points)
This Blue tooth attack tries to get sensitive data:
Question 15 options:
Blue Bugging
Blue Snarfing
Bluesmacking
Blue Cracking
Save
Question 16 (5 points)
Which of the following is a tool that will allow you to capture packets?
Question 16 options:
Airdecap-ng
Airodump-ng
Aircrack-ng
Packetforge-ng
Save
Question 17 (5 points)
Wired Equivalent Privacy (WEP) keys can be (Choose all that apply):
Question 17 options:
512 bits
256 bits
104 bits
40 bits
Save
Question 18 (5 points)
Phonesnoop is a (Choose all that apply):
Question 18 options:
Andriod hack
Wi-Fi hack
Bluetooth hack
Blackberry hack
Save
Question 19 (5 points)
Blue sniff is a Bluetooth wardriving tool that works on Windows.
Question 19 options:
False
True
Save
Question 20 (5 points)
Which of the following uses Orthogonal Frequency Division Multiplexing? (choose all that apply)
Question 20 options:
802.11g
802.11b
802.11a
802.11n
Save
Question 1 (5 points)
This antenna is based on the principal of a satellite dish and can pick up Wi-Fi signals from 10 miles away:
Question 1 options:
Omni Directional
Dipole
Parabolic
Yagi
Save
Question 2 (5 points)
Best Wireless Security Practices include (Choose all that apply):
Question 2 options:
Disable SSID Broadcast
Use WEP
Change the Default SSID
Change the Router Access Password
Save
Question 3 (5 points)
This transmission method of digital data uses a pseudo random noise spreading code:
Question 3 options:
FHSS
IR
DSSS
OFDM

-
Rating:
5/
Solution: CMIT 321 Quiz 5 - Which of the following is true about the 802