CMIT 321 Quiz 5 - Which of the following is true about the 802

Question # 00791595 Posted By: dr.tony Updated on: 01/28/2021 09:52 AM Due on: 01/28/2021
Subject Education Topic General Education Tutorials:
Question
Dot Image

University of Maryland, University College CMIT 321 quiz 5

CMIT 321 combined Quiz 5

Top of Form

CMIT 321 Quiz 5 score 84%

Question 1 (5 points)

Which of the following is true about the 802.11i standard?

Question 1 options:

 

It operates at both 2.4 GHZ and 5 GHZ

 

It operates at 2.4 GHZ only

 

It defines WPA-2 Enterprise and Personal

 

It operates at 5 GHZ only

Save

 

Which of the following tools will allow you crack WPA Passphrases and WEP keys? (Choose one)

 

Question 1 options:

 

Airodump-ng

 

Packetforge-ng

 

Aircrack-ng

 

Airdecap-ng

 

 

Question 2 (5 points)

 

 

Which of the following are part of the aircrack-ng suite? (Choose all that apply)

 

Question 2 options:

 

Packetforge-ng

 

Aircrack-ng

 

Airdecap-ng

 

Airodump-ng

Save

 

 

 

Question 3 (5 points)

 

 

The MAC Address of an access point is referred to as the ____.

 

Question 3 options:

 

OFDM

 

SSID

 

BSSID

 

ESSID

 

 

Question 4 (5 points)

 

 

You are testing a web application for SQL injection vulnerabilities. You send various SQL statements with return results on the screen. What kind of SQL injection attacking are you performing.

 

Question 4 options:

 

Blind SQL injection

 

Regular SQL injection

 

SQLEXEC

 

Stored procedure attack

 

Question 5 (5 points)

 

 

You have been hired to perform a web application security test. The Web site that you are testing uses dynamic content that connects to back-end database. If you wanted to test for SQL injection. What is the first character that you should use to test for input vulnerabilities?

 

Question 5 options:

 

Pair of hyphens

 

Semi colon

 

Single quote

 

Phonesnoop is a (Choose all that apply):

 

Question 6 options:

 

Wi-Fi hack

 

Bluetooth hack

 

Andriod hack

 

Blackberry hack

 

 

 

Question 7 (5 points)

 

 

In this Blue tooth attack, the attacker takes control of the device:

 

Question 7 options:

 

Bluesmacking

 

Blue Bugging

 

Blue Cracking

 

Blue Snarfing

 

Question 8 (5 points)

 

 

To help prevent SQL injection attacks all ____ should be validated before transmitting it to the server.

 

Question 8 options:

 

TCP packets

 

Sessions IDs

 

User input

 

passwords

 

Question 9 (5 points)

 

 

SQL Databases include (Choose all that apply):

 

Question 9 options:

 

MS Access

 

My SQL

 

Oracle

 

Microsoft SQL

 

 

 

 

Which of the following is a tool that will allow you decrypt traffic?

 

Question 10 options:

 

Packetforge-ng

 

Airdecap-ng

 

Airodump-ng

 

Aircrack-ng

 

Wi-Fi Chalking includes which of the following? (choose all that apply)

 

Question 11 options:

 

War Chalking

 

War Walking

 

War Driving

 

War Flying

Save

 

 

Previous Page

Next Page

Page 11 of 20

 

 

 

Question 12 (5 points)

 

 

This transmission method of digital data uses a pseudo random noise spreading code:

 

Question 12 options:

 

FHSS

 

DSSS

 

IR

 

OFDM

 

 

 

 

 

Question 13 (5 points)

 

 

This tool will allow you to capture packets:

 

Question 13 options:

 

Packetforge-ng

 

Aircrack-ng

 

Airdecap-ng

 

Airodump-ng

Save

 

 

Question 14 (5 points)

 

 

This antenna is based on the principal of a satellite dish and can pick up Wi-Fi signals from 10 miles away:

 

Question 14 options:

 

Dipole

 

Yagi

 

Parabolic

 

Omni Directional

 

This SQL command can be used to retrieve targeted rows and columns by specifying row and column names.

 

Question 15 options:

 

UNION

 

GET

 

Stored procedure

 

SELECT

Save

 

 

 

 

An SSID (select all that apply):

 

Question 16 options:

 

Will be encrypted in WEP or WPA/WPA2 is utilized

 

Is Case Sensitive

 

Is part of the frame header

 

Can be up to 32 characters

Save

 

 

Question 17 (5 points)

 

 

A validation control mechanism that is used to check for SQL-specific metacharacters such as single quotes or double dashes.

 

Question 17 options:

 

Exceptions

 

Store procedure

 

Regular expressions

 

SQL filter

 

Question 18 (5 points)

 

 

Using the ___ function an attacker can inject SQL statements into MYSQL without using double quotes.

 

Question 18 options:

 

Benchmark

 

Sleep

 

SQLEXC

 

Char

 

 

 

 

Question 19 (5 points)

 

 

Which of the following uses Orthogonal Frequency Division Multiplexing? (choose all that apply)

 

Question 19 options:

 

802.11g

 

802.11a

 

802.11b

 

802.11n

 

uestion 20 (5 points)

 

 

This Blue tooth attack tries to get sensitive data:

 

Question 20 options:

 

Bluesmacking

 

Blue Cracking

 

Blue Snarfing

 

Blue Bugging

 

Question 2 (5 points)

 

Which of the following is a tool that will allow you decrypt traffic?

Question 2 options:

 

Aircrack-ng

 

Packetforge-ng

 

Airodump-ng

 

Airdecap-ng

Save

Question 3 (5 points)

 

Blue Tooth attacks include (Choose all that apply):

Question 3 options:

 

Blue Snarfing

 

Blue Bugging

 

Bluesmacking

 

Blue Cracking

Save

Question 4 (5 points)

 

The MAC Address of an access point is referred to as the ____.

Question 4 options:

 

ESSID

 

BSSID

 

OFDM

 

SSID

Save

Question 5 (5 points)

 

Which of the following tools will allow you crack WPA Passphrases and WEP keys? (Choose one)

Question 5 options:

 

Airdecap-ng

 

Airodump-ng

 

Aircrack-ng

 

Packetforge-ng

Save

Question 6 (5 points)

 

Which version of Wired Equivalent Privacy (WEP) uses a 104-bit key size?

Question 6 options:

 

128 bit WEP

 

64 bit WEP

 

256 bit WEP

 

152 bit WEP

Save

Question 7 (5 points)

 

An SSID (select all that apply):

Question 7 options:

 

Is part of the frame header

 

Will be encrypted if WEP or WPA/WPA2 is utilized

 

Is Case Sensitive

 

Can be up to 32 characters

Save

Question 8 (5 points)

 

Blue Tooth modes include (Choose all that apply):

Question 8 options:

 

Airplane

 

Pairable

 

 

Non-pairable

 

Hotspot

Save

Question 9 (5 points)

 

SQL Databases include (Choose all that apply):

Question 9 options:

 

MS Access

 

Oracle

 

My SQL

 

Microsoft SQL

Save

Question 10 (5 points)

 

Wi-Fi Chalking includes which of the following? (choose all that apply)

Question 10 options:

 

War Walking

 

War Chalking

 

War Driving

 

War Flying

Save

Question 11 (5 points)

 

Which of the following are part of the aircrack-ng suite? (Choose all that apply)

Question 11 options:

 

Packetforge-ng

 

Aircrack-ng

 

Airdecap-ng

 

Airodump-ng

Save

Question 12 (5 points)

 

This Blue tooth attack occurs because an oversized ping packet:

Question 12 options:

 

Blue Bugging

 

Blue Cracking

 

Bluesmacking

 

Blue Snarfing

Save

Question 13 (5 points)

 

According to the text, by 2018, what percent of enterprises will specify Wi-Fi as the default connection?

Question 13 options:

 

60%

 

40%

 

75%

 

25%

Save

Question 14 (5 points)

 

An SSID is NOT (Choose one )?

Question 14 options:

 

Case Sensitive

 

up to 32 characters

 

encrypted if WEP or WPA/WPA2 is utilized

 

part of the frame header

Save

Question 15 (5 points)

 

This Blue tooth attack tries to get sensitive data:

Question 15 options:

 

Blue Bugging

 

Blue Snarfing

 

Bluesmacking

 

Blue Cracking

Save

Question 16 (5 points)

 

Which of the following is a tool that will allow you to capture packets?

Question 16 options:

 

Airdecap-ng

 

Airodump-ng

 

Aircrack-ng

 

Packetforge-ng

Save

Question 17 (5 points)

 

Wired Equivalent Privacy (WEP) keys can be (Choose all that apply):

Question 17 options:

 

512 bits

 

256 bits

 

104 bits

 

40 bits

Save

Question 18 (5 points)

 

Phonesnoop is a (Choose all that apply):

Question 18 options:

 

Andriod hack

 

Wi-Fi hack

 

Bluetooth hack

 

Blackberry hack

Save

Question 19 (5 points)

 

Blue sniff is a Bluetooth wardriving tool that works on Windows.

Question 19 options:

 

False

 

True

Save

Question 20 (5 points)

 

Which of the following uses Orthogonal Frequency Division Multiplexing? (choose all that apply)

Question 20 options:

 

802.11g

 

802.11b

 

802.11a

 

802.11n

Save

 

Question 1 (5 points)

 

This antenna is based on the principal of a satellite dish and can pick up Wi-Fi signals from 10 miles away:

Question 1 options:

 

Omni Directional

 

Dipole

 

Parabolic

 

Yagi

Save

Question 2 (5 points)

 

Best Wireless Security Practices include (Choose all that apply):

Question 2 options:

 

Disable SSID Broadcast

 

Use WEP

 

Change the Default SSID

 

Change the Router Access Password

Save

Question 3 (5 points)

 

This transmission method of digital data uses a pseudo random noise spreading code:

Question 3 options:

 

FHSS

 

IR

 

DSSS

 

OFDM

Dot Image
Tutorials for this Question
  1. Tutorial # 00790928 Posted By: dr.tony Posted on: 01/28/2021 09:53 AM
    Puchased By: 2
    Tutorial Preview
    The solution of CMIT 321 Quiz 5 - Which of the following is true about the 802...
    Attachments
    CMIT_321_Quiz_5_-_Which_of_the_following_is_true_about_the_802.ZIP (18.96 KB)

Great! We have found the solution of this question!

Whatsapp Lisa