An attack that sends unsolicited messages to Bluetooth-enabled device
What is Bluejacking
It is an attack where software or malware is downloaded and installed without explicit consent from the user
What is Drive-by-download
Associated port for Domain Name System (DNS)
What is port 53
Was developed by VISA and MasterCard to secure Credit Card transactions
What is Secure Electronic Transaction (SET)
Refers to an unauthorized person listening to conversations of employees or other authorized personnel discussing sensitive topics
What is Eavesdropping
Access Point configured by attackers to mimic an organization's AP
What is Evil twin
Occurs when the operating system or an application does not properly enforce boundaries for how much and what type of data can be inputted
What is Buffer-overflow
Corresponding ports for File Transfer Protocol service
What is port 20/21(TCP)
Was developed by Netscape to secure Internet based client/server interactions
What is Secure Sockets Layer (SSL)
The type of phishing attack that automatically redirects the user to a fake web site
What is pharming
_____ is a form of tailgating that involves the tailgater colluding with an authorized person
Piggy-backing
It is an attack that injects scripts into Web pages. When the user views the Web page, the malicious scripts run allowing the attacker to capture information or perform other actions
What is Cross-site scripting (XSS)
Corresponding port for Simple Mail Transfer Protocol (SMTP) service
Port 25 (TCP)
Was developed for the UNIX platform to encrypt or secure communications for remote facilities
What is Secure Shell (SSH)
____ are privileges that are granted to users to access hardware and software resources
Access Rights
Ensures that a wireless LAN can provide its intended functionality and meet its requirement and desired goals ______
Site Surveys
This attack occurs when an attacker includes database commands within user data input fields on a form, and those commands subsequently execute on the server
What is SQL injection
The associated port for Network Time Protocol (NTP) service
What is port number 123
is a commercial asymmetric cryptosystem used for e-mail protection
What is Pretty Good Privacy (PGP)
A variation of spam that targets instant messaging users instead of email users
What is spim
is an arbitrary number that can be used along with a secret key for data encryption in WLAN
What is Initialization vector (IV)
What is the Markup language designed to carry data?
What is XML
Corresponding port for Remote Desktop service
What is Port 3389
Was developed by CISCO to secure Remote Access Dial-in User Service (RADIUS)
What is TACACS+? (Terminal Access Controller Access-Control System Plus)
Redirecting a user to a fictitious web site based on misspelling of the URL
What is typo squating