Page 790 - StudyBook.pdf
P. 790
774 Appendix • Self Test Appendix
C. PDAs, cell phones, and wireless network cards all have the ability to use wireless networks.
Although PDAs and network cards can use wired networks (A), cell phones cannot. Since
wireless technology is passed over open airwaves, private networks (B) are not the best answer.
All three (PDAs, cell phones, and network cards) are relatively new technologies, and will not
function on antique networks (D).
3. There are three recognized levels of hacking ability in the Internet community.The first is the
skilled hacker, who writes the programs and scripts that script kiddies use for their attacks.
Next comes the script kiddie, who knows how to run the scripts written by the skilled
hackers.After the script kiddies come the _______________, who lack the basic knowledge
of networks and security to launch an attack themselves.
A. Web kiddies
B. Clickers
C. Click kiddies
D. Dunce Kiddies
C. Click kiddies rely on attack portals to carry out their attacks because they lack the knowl-
edge to perform the attack themselves.
Answers A, B, and D are incorrect because none of these terms are used in reference to
attackers.
4. Choose the correct set of terms:When a wireless user, also known as the ___________ wants
to access a wireless network, 802.1x forces them to authenticate to a centralized authority
called the ____________.
A. Authenticator; supplicant
B. Supplicant; authenticator
C. Supplicant; negotiator
D. Contact; authenticator
B.A supplicant (user) who wants to use 802.1x to protect their wireless transmissions first
needs to authenticate to a centralized authority known as an authenticator.
Answer A is incorrect because the order of terms is backwards.Answer C is only half correct.
Although a supplicant is the correct term for a wireless user, a negotiator is a fictitious term in
802.1x. Likewise, answer D is incorrect because a contact is a fictitious term in 802.1x,
although authenticator is the correct term for the central authority.
5. IPSec implemented in _____________ specifies that only the data will be encrypted during
the transfer.
A. Tunnel mode
B. Unauthorized state mode
C. Transfer mode
D. Transport mode
www.syngress.com