Page 179 - StudyBook.pdf
P. 179
Communication Security: Remote Access and Messaging • Chapter 3 163
3. There are three recognized levels of hacking ability in the Internet commu-
nity.The first is the skilled hacker, who writes the programs and scripts that
script kiddies use for their attacks. Next comes the script kiddie, who knows
how to run the scripts written by the skilled hackers.After the script kiddies
come the _______________, who lack the basic knowledge of networks and
security to launch an attack themselves.
A. Web kiddies
B. Clickers
C. Click kiddies
D. Dunce Kiddies
4. Choose the correct set of terms:When a wireless user, also known as the
___________ wants to access a wireless network, 802.1x forces them to
authenticate to a centralized authority called the ____________.
A. Authenticator; supplicant
B. Supplicant; authenticator
C. Supplicant; negotiator
D. Contact; authenticator
5. IPSec implemented in _____________ specifies that only the data will be
encrypted during the transfer.
A. Tunnel mode
B. Unauthorized state mode
C. Transfer mode
D. Transport mode
6. One of the biggest differences between TACACS and TACACS+ is that
TACACS uses _________ as its transport protocol and TACACS+ uses
_________ as its transport protocol.
A. TCP; UDP
B. UDP;TCP
C. IP;TCP
D. IP; UDP
www.syngress.com