Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

The KRACK attack on WPA2 was an attack on which of the following: The key The encryption primatives used Implementation of the encryption The protocol

  1. The KRACK attack on WPA2 was an attack on which of the following:

The key

The encryption primatives used

Implementation of the encryption

The protocol

  1. Which of these causes vulnerabilities in Bluetooth?

It is expected to be short range, but with the right antenna, the traffic can be picked up from much farther away

Many devices do not have a user interface and therefore must pair using a static key

Many Bluetooth devices are battery operated and cannot expend the energy to implement more advanced security

Purchasing the devices themselves is cheap, and this has led many attackers to get some and play

All of the above

Which of these is a wireless protocol used in many industrial applications?

Zigbee

UDP/ANT

WIPS

Randt

IEEE 802.5

A _____ cipher is used to perform bit-by-bit encryption of the plaintext, using a (hopefully) non-repeating pseudorandom key to XOR each bit of the plaintext with one bit of the key

block

stream

caesar

Playfair

All of the above

QUESTION 5

Which of these is a security issue with home wireless routers

An ISP or service provider often places a remote administrative password on the public interface of routers provided by the ISP or service provider

Manufacturers often include hardcoded credentials in wireless routers

Many people still use WEP because their old WEP WiFi router hasn't broken yet

Many home WiFi routers don't auto-update, and users almost never update them, so as vulnerabilities are discovered, they remain unfixed until the router gets replaced

All of the above

What was Microsoft trying to protect users from, when it accidentally made all system memory (including kernel memory) readable and writable to all processes on the system

Krack

WEP cracking

Spectre/Meltdown

Wannacry

Evil Maid attacks

Which of these might be a good place to look for plaintext passwords that could be usable for privilege escalation

Adminsitration scripts

Login scripts

text files and spreadsheets in the user's directory

Source code

All of the above

Which of these Linux text editors was pointed to in class as providing an option to launch a command shell, which, if the editor was setuid root, would be a root shell?

texteditor++

wasabi

vi

green edit

All of the above

Which of the attacks below can occur when the user can control some object or value before the program can use it

TOC/TOU (Time of Check/Time of Use) attacks

Friending attacks

Object squatting

Blind SQL Injection

Both A and C

In patching vulnerability MS14-025 what did many system admnistrators fail to do which led to ongoing vulnerability

Apply the patch a second time as specified in the KB article

Remove weakly protected credentials which had already been placed in the SYSVOL share

re-encrypt the SAM from the command line

Uninstall the previous version prior to applying the patch

All of the above

CHOOSE THE ANSWER

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Data Management Databases And Organizations

Authors: Richard T. Watson

6th Edition

1943153035, 978-1943153039

More Books

Students also viewed these Databases questions

Question

U11 Informing Industry: Publicizing Contract Actions 317

Answered: 1 week ago

Question

LO5 Highlight five external recruiting sources.

Answered: 1 week ago