07 Jun __________is a virus that infects Windows systems by searching all the drives and connected network
Question
____________ is a virus that infects Windows systems by searching all the drives and connected network shares to locate files with an EXE or SCR extension. The virus can also connect to remote websites to download malicious code.
W32/Dzan-C
W32/Hasnot-A
W32/Madang-Fam
W32/Fujacks-AK
Question 2 (5 points)
____________ is a type of RFID attack that produces illegal copies of legitimate RFIP tags—for example, when a supermarket item tag is replaced with a similar tag so that thieves can purchase the items at lower prices.
Replay
Switching
Spoofing
Tracking
Question 3 (5 points)
____________ is a method used to allow the installation of third-party software on an iPhone or iPod Touch device.
iHacking
Jailbreaking
iActivate
iFreedom
Question 4 (5 points)
Which of the following are Bluetooth security issues? (Select all that apply.)
short PINs
nonnegotiable length of encryption
shared master key
reusable unit keys
Question 5 (5 points)
The ____________ is a unique 15- or 17-digit code used to identify a mobile station to a GSM network and make it easier to deactivate a device that has been lost or stolen.
International Mobile Equipment Identity (IMEI)
Subscriber Identity module (SIM)
SIM lock number (SLN)
International Mobile Identity number (IMIN)
Question 6 (5 points)
Electrical attacks on USB drives involve ____________ access to a device’s circuit board.
remote
unauthorized
root
physical
Question 7 (5 points)
____________ is a communication service standardized in the GSM mobile communication system that allows exchange of short text messages between mobile telephone devices.
GPRS
SMS
CDMA
SIP
Question 8 (5 points)
This USB security tool integrates with Active Directory, using built-in Group Policy mechanisms to enforce centralized access control.
USB Blocker
USBDeview
MyUSBOnly
ADUSBpolicy
Question 9 (5 points)
In this Bluetooth attack, the attacker poses as one of the two devices and sends a message to the other, claiming that the device has forgotten the link key and prompting the devices to pair again and generate a new link key. The attacker then uses the new key to eavesdrop on communication between the two devices.
bluejacking
blueprinting
bluesmacking
short pairing code attack
Question 10 (5 points)
____________ RFIP tags are larger and more expensive than passive tags because they have their own power source, which is used to run the microchip’s circuitry and send a signal to the reader.
Semipassive
Active
Nonpassive
Reader
Question 11 (5 points)
This cryptographic key is used to generate working session keys for the encrypted exchange of information between two Bluetooth devices.
certificate
Master Session Key (MSK)
key pairing
piconet
Question 12 (5 points)
____________ is wireless technology that allows mobile phones, computers, and other devices to exchange information using short-range connections.
Blue pairing
Piconet
Bluetooth
BlackBerry
Question 13 (5 points)
Which type of RFID tag has a read-only chip?
passive
active
read-only
semipassive
Question 14 (5 points)
Which of the following tools can be used to copy files to a USB storage device and dynamically encrypt and compress files and folders?
USBlyzer
USBLock
Remora USB File Guard
USBSwitchblade
Question 15 (5 points)
This Bluetooth attack causes no damage to the targeted device but may be annoying and disruptive to its victims, similar to e-mail spamming.
bluejacking
bluespamming
bluebugging
bluesmacking
Question 16 (5 points)
The SymbOS/MultiDropper.CG malware targets the Symbian operating system and comes bundled with different multidropper mobile phone ____________.
Trojans
apps
rootkits
viruses
Question 17
What type of attack on a USB device driver can allow an attacker to bypass Windows security and gain administrator access on the host machine?
denial of service
rootkit
buffer overflow
Trojan
Question 18
____________ is a security tool that alerts system administrators anytime a removable USB storage device is used on any computer on the network.
USBNotifier
Remora USB Alerter
Advanced USB Monitor
USB CopyNotify!
Question 19
This USB hacking tool runs in the background and automatically downloads the content of any USB drive connected to the system. This tool can be integrated with other hacking tools such as USB Hacksaw and scripts to send downloaded files to remote locations through encrypted e-mail or FTP.
USB Switchblade
USBDumper
USBDeview
USBDownloader
Question 20
When this is used in an RFID tag, a command can be sent to deactivate the tag and can never be reactivated.
RSA blocker tag
RFID wipe
format switch
kill switch
Our website has a team of professional writers who can help you write any of your homework. They will write your papers from scratch. We also have a team of editors just to make sure all papers are of HIGH QUALITY & PLAGIARISM FREE. To make an Order you only need to click Ask A Question and we will direct you to our Order Page at WriteDemy. Then fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.
Fill in all the assignment paper details that are required in the order form with the standard information being the page count, deadline, academic level and type of paper. It is advisable to have this information at hand so that you can quickly fill in the necessary information needed in the form for the essay writer to be immediately assigned to your writing project. Make payment for the custom essay order to enable us to assign a suitable writer to your order. Payments are made through Paypal on a secured billing page. Finally, sit back and relax.
About Writedemy
We are a professional paper writing website. If you have searched a question and bumped into our website just know you are in the right place to get help in your coursework. We offer HIGH QUALITY & PLAGIARISM FREE Papers.
How It Works
To make an Order you only need to click on “Order Now” and we will direct you to our Order Page. Fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.
Are there Discounts?
All new clients are eligible for 20% off in their first Order. Our payment method is safe and secure.
