Reference no: EM133337323
Assignment:
1. What numbering system is used by computer engineers to make computers, and why was this numbering system selected?
a. The base-10 numbering system was chosen because it is the most common numbering system.
b. The hexadecimal numbering system was chosen because of the number of devices using the Internet.
c. The base-64 numbering system was chosen because it gives the computer the most options.
d. The binary number system was chosen because logic chips make binary decisions (true/false, on/off).
2. Rootkits that pose the biggest threat to any OS are those that infect what part of the targeted device?
a. firmware
b. testware
c. middleware
d. fireware
3. To keep attackers from knowing the directory structure you create on an IIS web server, an individual should create what?
a. Physical directory
b. Virtual directory
c. Active directory
d. Root directory
4. What element is used in an HTML document to allow customers to submit information to the web server?
a. <!DOCTYPE>
b. <a href>
c. <form>
d. <body>
5. What is the specific act of checking a user's privileges to understand if they should or should not have access to "a" page, field, resource, or action in an application?
a. authentication
b. authorization
c. auditing
d. discovery
6. What type of useful tools can "a" security tester find available in both Firefox and Chrome Web browsers?
a. security tools
b. scan tools
c. developer tools
d. SQL tools
7. When hackers drive around or investigate an area with an antenna, they are usually looking for which component of a wireless network?
a. router
b. switch
c. access point
d. firewall
8. A service set identifier (SSID) is the name used to identify a WLAN. Which of these ensures better AP security?
a. Create a unique SSID.
b. Broadcast SSIDs in cleartext.
c. Disable SSID broadcasts.
d. Use a default SSID.
9. Wi-Fi Protected Setup (WPS) is a wireless authentication standard created to allow users to add devices easily and securely to a wireless network. How does WPS make this process easier?
a. WPS automatically prints the wireless network passphrase when a new device is waiting to be added.
b. WPS eliminates the need for a username, and instead requires only a 4 digit pin.
c. WPS allows a user to press a button on the router and the WPS-enabled device pairs with the router.
d. WPS uses a biometric login.
10.A hacker can use tools like Vistumbler or Kismet to determine which of the following?
a. SSID
b. MAC address of the AP
c. Whether WPS is enabled
d. These tools can be used to determine all of these and more