Save
Upgrade to remove ads
Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.
focusNode
Didn't know it?
click below
 
Knew it?
click below
Don't Know
Remaining cards (0)
Know
0:00
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

ITN 260 Final Exam

QuestionAnswer
Which option below is responsible for the issuing of EAP request packets? authenticator
Which direction do access point antennas radiate their signals and where should they be located? all directions and centrally located
Which of the following is the most secure form of IEEE 802.1x authentication? certificate-based authentication
Where does the supplicant send identity information? authenticator
The Temporal Key Integrity Protocol (TKIP) encryption technology uses a MIC value that is what length? 64 bits
Piconets in which connections exist between different piconets are known as which of the following terms? scatternet
Which EAP protocol creates an encrypted channel between the client authentication server and the client, and uses Microsoft Windows logins and passwords? PEAP
What encryption protocol is used for WPA2? CCMP
Slave devices that are connected to a piconet and are sending transmissions are known as what? active slave
When using AES-CCMP, the AES-256 bit key requires how many rounds? 13
What technology uses a standard web browser to provide information, and gives the wireless user the opportunity to agree to a policy or present valid login credentials, providing a higher degree of security? captive portal AP
What is the maximum transmission power for IEEE WLANs? 200 milliwatts (mW)
Authentication for WPA Personal is accomplished by using what type of key? PSK
Which AV approach uses a variety of techniques to spot the characteristics of a virus instead of attempting to make matches? heuristic monitoring
A spiked collar that extends horizontally for up to 3 feet from the pole is an example of what kind of technology? Anti-climb
Which of the following are application development stages? (Choose all that apply.) staging, testing
Which OS hardening technique removes all unnecessary features that may compromise an operating system? kernel pruning
Anti-virus products typically utilize what type of virus scanning analysis? Static analysis
How can an area be made secure from a non-secured area via two interlocking doors to a small room? Using a mantrap
What type of OS in firmware is designed to manage a specific device like a video game console? appliance OS
What publicly released software security update is intended to repair a vulnerability? patch
Which of the following is a popular type of removable data storage used on mobile devices? SD
What type of storage is used on mobile devices? flash memory
What type of tools are involved in effective patch management? (Choose all that apply.) patch distribution, patch reception
What software methodology includes security automation? Secure DevOps
What specific process in application development removes a resource that is no longer needed? deprovisioning
What is the maximum range of most Bluetooth 5 devices? 800 ft
What specific feature on an AP controls how much of the spectrum is available to transfer data? channel width
What device acts like a wireless base station in a network, acting as a bridge between wireless and wired networks? access Point
What type of access point is configured by an attacker in such a manner that it mimics an authorized access point? evil twin
Which encryption protocol below is used in the WPA2 standard? AES-CCMP
What type of survey can help a network administrator make decisions about bands, channels, and widths when installing new access points? site
Select the device that is designed to exclusively monitor the RF frequency for network transmissions? WAP
An access point that is unauthorized and allows an attacker to bypass network security configurations is considered to be what type of access point? rogue
Most portable devices, and some computer monitors have a special steel bracket security slot built into the case, which can be used in conjunction with a: cable lock
A Wi-Fi enabled microSD card is an example of what type of device? SDIO
What security standard was introduced in conjunction with UEFI? Secure Boot
What type of OS manages hardware and software on a client computer? workstation OS
Which of the following are considered to be part of a typical OS security configuration? (Choose all that apply.) Employing least functionality, Disabling default accounts/passwords
In Microsoft Windows, what type of templates are a collection of security configuration settings? security
Which of the following self-contained APs are autonomous, or independent, because they are separate from other network devices and even other autonomous APs? fat APs
What is the maximum number of characters that can exist within a SSID name? 32
What monitors emails for spam and other unwanted content to prevent these messages from being delivered? mail gateway
An independently rotating large cup affixed to the top of a fence prevents the hands of intruders from gripping the top of a fence to climb over it. What is the name for this technology? roller barrier
What type of filtering software divides email messages that have been received into two piles, spam and non-spam and then analyzes every word in each email and determines how frequently a word occurs in the spam pile compared to the not-spam pile? Bayesian filtering
What U.S. government classified standard is intended to prevent attackers from picking up electromagnetic fields from government buildings? TEMPEST
What type of update does not allow a user to refuse or delay security updates? forced
A Bluetooth attack in which the attacker accesses unauthorized information from a wireless device using a Bluetooth connection, is known as which of the following terms? Bluesnarfing
Select the EAP protocol that uses digital certificates for authentication? EAP-TLS
Which of the following choices is not one of the four types of packets used by EAP? Error
Which application development life-cycle model uses a sequential design process? waterfall
What specific software can examine a computer for any infections as well as monitor computer activity and scan new documents that might contain a virus? antivirus
What PIN is considered to be the most commonly used PIN? 1234
A computer that uses SSD drives and is smaller than a standard notebook is an example of what type of a portable computer? subnotebook
A QR code can't contain which of the following items directly? A video.
Which of the following is NOT an Android Smart Lock configuration option? User device detection
Which of the following frameworks requires a QR code or PIN on each IoT device for authenticating it to the network, and uses an Elliptic Curve Diffie-Hellman secure key exchange and a Transport Layer Security (TLS) tunnel? Security 2 (S2) framework
What can be enabled to prevent a mobile device from being used until a user enters the correct passcode, such as a pin or password? Enable a lock screen
What connection technology allows a mobile device with a USB connection to act as either a host or a peripheral used for external media access? OTG
What type of technology can add geographical identification data to media such as digital photos taken on a mobile device? GPS tagging
Which enterprise deployment model allows users to use their personal mobile devices for business purposes? BYOD
Select the proprietary wireless network technology that is used primarily by sensors for communicating data. ANT
Which of the following is NOT a benefit of using the CYOD enterprise deployment model for an enterprise? increased internal service
What process gives a user access to a file system on a mobile device with full permissions, essentially allowing the user to do anything on the device? jailbreaking
What option below represents an example of behavioral biometrics? keystroke dynamics
A secret combination of letters, numbers, and/or characters that only the user should have knowledge of, is known as a: password
What specific type of authentication can be based on where the user is located? geolocation
What federated identity management (FIM) relies on token credentials? OAuth
The use of one authentication credential to access multiple accounts or applications is referred to as which of the following? single Sign On
Which of the following accounts is a user account that is created explicitly to provide a security context for services running on a server? service account
What kind of biometrics utilizes a person's unique physical characteristics for authentication, such as fingerprints or unique characteristics of a person's face? standard biometrics
Which of the following is a is a two-way relationship that is automatically created between parent and child domains in a Microsoft Active Directory forest? transitive trust
Which of the following is a category of group password settings in Microsoft Windows? (Choose all that apply.) Password Policy Settings, Account Lockout Policy
Which of the following is NOT a valid biometric disadvantage? false error rate
Which of the following account lockout policy settings determines the number of failed login attempts before a lockout occurs? account lockout threshold
If a user has more than one type of authentication credential, what type of authentication is being used? multifactor authentication
Which type of biometrics is based on the perception, thought process, and understanding of the user? cognitive biometrics
Which of the following can replace using radio frequency (RF) for the communication media? infrared
Select the item that is not considered to be a basic characteristic of mobile devices. A removable media storage.
What type of management system below can help distribute and manage public and corporate apps? Mobile Device Management
Which of the following selections is not one of the features provided by a typical MDM? Track stolen devices
What type of software is specifically designed for a SoC in an embedded system? RTOS
Which term below describes the time it takes for a key to be pressed and then released? dwell time
What type of authentication is based on what the user has? Security token
A U.S. Department of Defense (DoD) smart card that is used for identification of active-duty and reserve military personnel along with civilian employees and special contractors is called: Common Access Card (CAC)
What type of attack involves using every possible combination of letters, numbers, and characters to create candidate digests that are then matched against those in a stolen digest file? Brute force
The use of a single authentication credential that is shared across multiple networks is called: identity management
A list of the available nonkeyboard characters can be seen in Windows by opening what utility? charmap.exe
Created by: Elmoremc22
 

 



Voices

Use these flashcards to help memorize information. Look at the large card and try to recall what is on the other side. Then click the card to flip it. If you knew the answer, click the green Know box. Otherwise, click the red Don't know box.

When you've placed seven or more cards in the Don't know box, click "retry" to try those cards again.

If you've accidentally put the card in the wrong box, just click on the card to take it out of the box.

You can also use your keyboard to move the cards as follows:

If you are logged in to your account, this website will remember which cards you know and don't know so that they are in the same box the next time you log in.

When you need a break, try one of the other activities listed below the flashcards like Matching, Snowman, or Hungry Bug. Although it may feel like you're playing a game, your brain is still making more connections with the information to help you out.

To see how well you know the information, try the Quiz or Test activity.

Pass complete!
"Know" box contains:
Time elapsed:
Retries:
restart all cards