1. An employee who keeps complaining about slow network access sets up his own wireless access point....
Question:
1. An employee who keeps complaining about slow network access sets up his own wireless access point. What is this device called?
A. RFID
B. Bluetooth
C. NFC
D. rogue AP
2. What kind of attack is not done on NFC technology?
A. IV attack
B. capture data
C. spoofing
D. jamming
3. What are programs in PowerShell?
A. Python
B. VBA
C. Cmdlets
D. Bash
4. What is a programming language within Microsoft Office applications?
A. Bash
B. VBA
C. PowerShell
D. Python
5. Which of the following runs on Windows OS, MacOS, Linux, and Unix?
A. Python
B. Macros
C. Bash
D. PowerShell
6. What kind of attack happens when a proxy Trojan horse infects a vulnerable web browser and installs a browser extension?
A. MAC flooding
B. on-path (person-in-the-browser)
C. rogue access point
D. ARP poisoning
7. What is a command-line shell that can be used to manage almost every aspect of the Windows operating system?
A. Macros
B. Python
C. Bash
D. PowerShell
8. What is a programming language that is often used for web, mobile applications, and cloud computing?
A. Bash
B. PowerShell
C. Macros
D. Python
9. You notice that on some days, you frequently lose the wireless connection to your AP. However, on other days, there are no problems with the connection. Which of the following is the MOST likely reason for this?
A. bluejacking
B. jamming attack
C. rogue AP attack
D. disassociation attack
10. We can use this attack to crack the WEP pre-shared key.
A. RFID attack
B. rogue AP attack
C. IV attack
D. NFC attack
Income Tax Fundamentals 2015
ISBN: 9781305177772
33rd Edition
Authors: Gerald E. Whittenburg, Martha Altus Buller, Steven Gill