Wireless & Social Engineering Attacks Flashcards

(18 cards)

1
Q

What is Protocol Fuzzing?

A

tests the robustness of communication protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Packet crafting?

A
  • testing networks
  • Identify entry points
  • checking firewall rules

by using crafted packets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Are deauthentication attacks a type of DoS attack?

A

Yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Are WPS attacked are usually what type of attack?

A

brute force

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Pixie Dust attacks are what type of offline line attack?

A

WPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are CronTabs?

A

A list or table of commands that you want to execute

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Where is the CronTab normally stored in Linux?

A

in the /etc directory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does crontab -e do?

A

edit command

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does crontab -l do?

A

lists the contents of the crontab file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does crontab -r do?

A

removes the current crontab file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What does crontab -i do?

A

removes the current crontab file but prompts you

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are Daemons

A

Daemons consume memory even when not in use, which may tip off users if they experience performance issues or if they are actively monitoring memory usage. Also, daemons do not automatically restart upon termination unless specifically programmed to do so.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

VM sprawls refers to

A

to creating virtual machines (VMs) without proper change control procedures, which can create a vulnerable environment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

VM escape is an attack where malware running in a VM is able to

A

interact directly with the hypervisor or host kernel.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Mobile security framework (MobSF) provides an

A

automated evaluation of code and malware analysis, using both static and dynamic analysis.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Mobile application management (MAM) sets policies for apps

A

that can prevent unauthorized apps from being installed, automatically push out updates, and enable clients to select from a list of corporate compliant apps they can install.

17
Q

Open VAS will

A

list the vulnerabilities along with a risk rating

18
Q

What is Objection?

A

It is a runtime exploration toolkit that works in iOS devices.