Chat with us, powered by LiveChat __________is a virus that infects Windows systems by searching all the drives and connected network | Writedemy

__________is a virus that infects Windows systems by searching all the drives and connected network

__________is a virus that infects Windows systems by searching all the drives and connected network

Question

Question 1 (5 points)
____________ is a virus that infects Windows systems by searching all the drives and connected network shares to locate files with an EXE or SCR extension. The virus can also connect to remote websites to download malicious code.

W32/Dzan-C

W32/Hasnot-A

W32/Madang-Fam

W32/Fujacks-AK
Question 2 (5 points)
____________ is a type of RFID attack that produces illegal copies of legitimate RFIP tags—for example, when a supermarket item tag is replaced with a similar tag so that thieves can purchase the items at lower prices.

Replay

Switching

Spoofing

Tracking
Question 3 (5 points)
____________ is a method used to allow the installation of third-party software on an iPhone or iPod Touch device.

iHacking

Jailbreaking

iActivate

iFreedom
Question 4 (5 points)
Which of the following are Bluetooth security issues? (Select all that apply.)

short PINs

nonnegotiable length of encryption

shared master key

reusable unit keys
Question 5 (5 points)
The ____________ is a unique 15- or 17-digit code used to identify a mobile station to a GSM network and make it easier to deactivate a device that has been lost or stolen.

International Mobile Equipment Identity (IMEI)

Subscriber Identity module (SIM)

SIM lock number (SLN)

International Mobile Identity number (IMIN)
Question 6 (5 points)
Electrical attacks on USB drives involve ____________ access to a device’s circuit board.

remote

unauthorized

root

physical
Question 7 (5 points)
____________ is a communication service standardized in the GSM mobile communication system that allows exchange of short text messages between mobile telephone devices.

GPRS

SMS

CDMA

SIP
Question 8 (5 points)
This USB security tool integrates with Active Directory, using built-in Group Policy mechanisms to enforce centralized access control.

USB Blocker

USBDeview

MyUSBOnly

ADUSBpolicy

Question 9 (5 points)
In this Bluetooth attack, the attacker poses as one of the two devices and sends a message to the other, claiming that the device has forgotten the link key and prompting the devices to pair again and generate a new link key. The attacker then uses the new key to eavesdrop on communication between the two devices.

bluejacking

blueprinting

bluesmacking

short pairing code attack
Question 10 (5 points)
____________ RFIP tags are larger and more expensive than passive tags because they have their own power source, which is used to run the microchip’s circuitry and send a signal to the reader.

Semipassive

Active

Nonpassive

Reader
Question 11 (5 points)
This cryptographic key is used to generate working session keys for the encrypted exchange of information between two Bluetooth devices.

certificate

Master Session Key (MSK)

key pairing

piconet
Question 12 (5 points)
____________ is wireless technology that allows mobile phones, computers, and other devices to exchange information using short-range connections.

Blue pairing

Piconet

Bluetooth

BlackBerry
Question 13 (5 points)
Which type of RFID tag has a read-only chip?

passive

active

read-only

semipassive
Question 14 (5 points)
Which of the following tools can be used to copy files to a USB storage device and dynamically encrypt and compress files and folders?

USBlyzer

USBLock

Remora USB File Guard

USBSwitchblade
Question 15 (5 points)
This Bluetooth attack causes no damage to the targeted device but may be annoying and disruptive to its victims, similar to e-mail spamming.

bluejacking

bluespamming

bluebugging

bluesmacking
Question 16 (5 points)
The SymbOS/MultiDropper.CG malware targets the Symbian operating system and comes bundled with different multidropper mobile phone ____________.

Trojans

apps

rootkits

viruses
Question 17
What type of attack on a USB device driver can allow an attacker to bypass Windows security and gain administrator access on the host machine?
denial of service

rootkit

buffer overflow

Trojan
Question 18
____________ is a security tool that alerts system administrators anytime a removable USB storage device is used on any computer on the network.
USBNotifier

Remora USB Alerter

Advanced USB Monitor

USB CopyNotify!
Question 19
This USB hacking tool runs in the background and automatically downloads the content of any USB drive connected to the system. This tool can be integrated with other hacking tools such as USB Hacksaw and scripts to send downloaded files to remote locations through encrypted e-mail or FTP.
USB Switchblade

USBDumper

USBDeview

USBDownloader
Question 20
When this is used in an RFID tag, a command can be sent to deactivate the tag and can never be reactivated.
RSA blocker tag

RFID wipe

format switch

kill switch

Our website has a team of professional writers who can help you write any of your homework. They will write your papers from scratch. We also have a team of editors just to make sure all papers are of HIGH QUALITY & PLAGIARISM FREE. To make an Order you only need to click Ask A Question and we will direct you to our Order Page at WriteDemy. Then fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.

Fill in all the assignment paper details that are required in the order form with the standard information being the page count, deadline, academic level and type of paper. It is advisable to have this information at hand so that you can quickly fill in the necessary information needed in the form for the essay writer to be immediately assigned to your writing project. Make payment for the custom essay order to enable us to assign a suitable writer to your order. Payments are made through Paypal on a secured billing page. Finally, sit back and relax.

Do you need an answer to this or any other questions?

About Writedemy

We are a professional paper writing website. If you have searched a question and bumped into our website just know you are in the right place to get help in your coursework. We offer HIGH QUALITY & PLAGIARISM FREE Papers.

How It Works

To make an Order you only need to click on “Order Now” and we will direct you to our Order Page. Fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.

Are there Discounts?

All new clients are eligible for 20% off in their first Order. Our payment method is safe and secure.

Hire a tutor today CLICK HERE to make your first order