16. In a distributed computing environment, system security takes on an important role. Two types of network attacks exist: passive and active. Which of the following is an example of a passive attack?
a.
Attempting to log in to someone else’s accountb.
Installing a wiretap on a network cable to generate false messagesc.
Denying services to legitimate usersd.
Sniffing a system password when the user types itThe other three choices are incorrect because they are examples of active attacks. Active attacks occur when the threat makes an overt change or modification to the system in an attempt to take advantage of vulnerability.
17. Use of preshared keys (PSKs) in a wireless local-area network (WLAN) configuration leads to which of the following?
1.
Dictionary attack2.
Rainbow attack3.
Online attack4.
Offline attacka.
1 and 2b.
1 and 3c.
2 and 3d.
2 and 4The use of PSK should be avoided. In PSK environments, a secret passphrase is shared between stations and access points. The PSK is generated by combining the WLAN’s name and service set identifier (SSID) with a passphrase and then hashing this multiple times. Keys derived from a passphrase shorter than approximately 20 characters provide relatively low levels of security and are subject to dictionary and rainbow attacks. Changing the WLAN name or SSID will not improve the strength of the 256-bit PSK.
An online attack is an attack against an authentication protocol where the attacker either assumes the role of a claimant with a genuine verifier or actively alters the authentication channel. An offline attack is an attack where the attacker obtains some data through eavesdropping that he can analyze in a system of his own choosing. The goal of these attacks may be to gain authenticated access or learn authentication secrets.
18. Which of the following extensible authentication protocols is
a.
EAP-TLSb.
EAP-TTLSc.
MD5-Challenged.
PEAPThe MD-5 Challenge is based on the challenge-handshake authentication protocol (CHAP), which is not a secure protocol. The other three choices are a part of the transport layer security-based (TLS-based) EAP methods, which are very secure.
19. Web content filtering software is related to which of the following?
a.
Web bugb.
Blacklistingc.
REDd.
BLACK