Page 790 - StudyBook.pdf
P. 790

774    Appendix • Self Test Appendix


              C. PDAs, cell phones, and wireless network cards all have the ability to use wireless networks.
              Although PDAs and network cards can use wired networks (A), cell phones cannot. Since
                 wireless technology is passed over open airwaves, private networks (B) are not the best answer.
                 All three (PDAs, cell phones, and network cards) are relatively new technologies, and will not
                 function on antique networks (D).

              3.  There are three recognized levels of hacking ability in the Internet community.The first is the
                  skilled hacker, who writes the programs and scripts that script kiddies use for their attacks.
                  Next comes the script kiddie, who knows how to run the scripts written by the skilled
                  hackers.After the script kiddies come the _______________, who lack the basic knowledge
                  of networks and security to launch an attack themselves.
                  A. Web kiddies
                  B. Clickers
                  C. Click kiddies
                  D. Dunce Kiddies
              C. Click kiddies rely on attack portals to carry out their attacks because they lack the knowl-
                 edge to perform the attack themselves.
              Answers A, B, and D are incorrect because none of these terms are used in reference to
                 attackers.

              4.  Choose the correct set of terms:When a wireless user, also known as the ___________ wants
                  to access a wireless network, 802.1x forces them to authenticate to a centralized authority
                  called the ____________.
                  A. Authenticator; supplicant
                  B. Supplicant; authenticator
                  C. Supplicant; negotiator
                  D. Contact; authenticator
              B.A supplicant (user) who wants to use 802.1x to protect their wireless transmissions first
                 needs to authenticate to a centralized authority known as an authenticator.
              Answer A is incorrect because the order of terms is backwards.Answer C is only half correct.
                 Although a supplicant is the correct term for a wireless user, a negotiator is a fictitious term in
                 802.1x. Likewise, answer D is incorrect because a contact is a fictitious term in 802.1x,
                 although authenticator is the correct term for the central authority.

              5.  IPSec implemented in _____________ specifies that only the data will be encrypted during
                  the transfer.
                  A. Tunnel mode
                  B. Unauthorized state mode
                  C. Transfer mode
                  D. Transport mode




          www.syngress.com
   785   786   787   788   789   790   791   792   793   794   795