Involves increasing access on a system
What is Privilege escalation
Operates at a 5 GHz
What is 802.11a
Web applications are used to do this
What is Allowing dynamic content
Designed to intimidate users
What is Scareware
Sniffers can be used to do this
What is Capturing information
Used to store a password
What is Hash
A short-range wireless technology
What is Bluetooth
Two scripting languages
What are JavaScript and PHP
Used to intercept user informtion
What is Spyware
Used to overwhelm a service
What is hijacking
Used to reveal passwords
What is a password cracker
Dictates the performance of a wireless network
What are clients, interference, AP's
Used to audit databases
What is NCC SQuirreL
Prevents viruses and malware
What is antivirus software
Used to flood a switch with bogus MAC address
What is Spoofing
An offline attack
What is a rainbow attack
Blocks systems based on physical address
What is MAC filtering
Browsers do not display this
What are hidden fields
Powerful prevention measure for stopping viruses
What is education
A device that can have its memory filled up when MAC flooding is used
What is a switch
An attacker can use this to return to a system
What is a backdoor
Several AP's grounded together form a
What is a BSS
Can be caused by the exploitation of defects and code
What is SQL injection
Methods for transferring data in an uncommon manner
What are covert channels
Technique used when a traffic is captured on a network with hubs
What is Passive Sniffing