tutorialpoint.org

Engg. tutorials

  • Instrumentation and Control Lab
  • Control systems assignment
  • Shape memory alloy SMA actuator
  • Dielectric elastomer
  • EM theory lecture notes
  • GATE question papers
  • JAM question papers
  • Kalman filter tutorial
  • Nonlinear estimation
  • Certified Ethical Hacker (CEHv9) Questions and answers

    59. In 2007, this wireless security algorithm was rendered useless by capturing packets and discovering the passkey in a matter of seconds. This security flaw led to a network invasion of TJ Maoo and data theft through a technique known as wardriving. Which Algorithm is this referring to?

    A. Wi-Fi Protected Access 2 (WPA2) B. Wi-Fi Protected Access (WPA) C. Temporal Key Integrity Protocol (TKIP) D. Wired Equivalent Privacy (WEP)



    60. It is a kind of malware (malicious software) that criminals install on your computer so they can lock it from a remote location. This malware generates a pop-up window, webpage, or email warning from what looks like an official authority. It explains that your computer has been locked because of possible illegal activities on it and demands payment before you can access your files and programs again. Which of the following terms best matches the definition?

    A. Ransomware

    B. Riskware

    C. Spyware

    D. Adware



    < Prev.Page             CEHv9 Home             Next page>