SANS Cyber Security Technologies Part 1&2 Questions And
Answers 100% Passed Tests
What is the encryption algorithm used in WPA2 ANS AES
What is the single most important thing you can do to improve Wi-Fi security? ANS Upgrade to
WPA2
Why does antenna/transmitter strength matter in Wi-Fi? ANS Wi-Fi signals travel and can be
intercepted outside your facility
What is the most common Bluetooth class and range? ANS Class 2: 10 meters
In Bluetooth, what does SSP stand for? ANS Secure Simple Paring
Which encryption algorithm is used in SSP? ANS AES
What is the most recent Wi-Fi standard released in January 2014? ANS 802.11ac
What is the current encryption specification for Wi-Fi? ANS WPA2
If both Bluetooth devices have a screen to display a 6-digit number and can accept a yes/no response,
which Association Model should you use? ANS Numeric Comparison
What is the key exchange mechanism used by Secure Simple Paring? ANS Elliptical Curve
Diffie-Hellman (ECDH)
What are the five phases of an attack? ANS Reconnaissance, Scanning, Gaining Access,
Maintaining Access, Covering Tracks
, Which is the most common successful attack? ANS Social engineering
What is the URL of the Wayback Machine? ANS http://www.archive.org
What is maintained by the Google Dorks? ANS The Google Hacking Database
Is Spear Phishing an example of direct or indirect social engineering? ANS Indirect
What does "A reason given in justification that is not the real reason" define? ANS Pretexting
Hiding the real source IP address is commonly referred to as ANS IP Spoofing
What does the acronym MitM stand for? ANS Man in the Middle
What is an attack against the availability of a system called? ANS Denial of Service (DoS)
Which is an attack that exploits the TCP three-way handshake? ANS SYN Flood
What are two names for the computers commonly used in Distributed Denial of Service attacks?
ANS Zombie, Bot
What are two names for the collection of machines commonly used in DDoS attacks? ANS
Zombie Army, Botnet
What is malware that is self-standing and self-propagating in nature called? ANS Worm
What is malware that waits for a preconfigured event or date to execute called? ANS Logic
Bomb
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller Labtech. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $13.99. You're not tied to anything after your purchase.