CSI454 Test 2 Revision Questions

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/28

flashcard set

Earn XP

Description and Tags

These flashcards cover key concepts and questions related to wireless, mobile, IoT, and cloud computing security as discussed in the lecture.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

29 Terms

1
New cards

What are deauthentication attacks in wireless security?

Attacks that disconnect users from their wireless networks.

2
New cards

What is an Evil Twin attack?

A rogue access point that mimics a legitimate one to steal user information.

3
New cards

What encryption standards are commonly used in wireless security?

WPA2 and WPA3.

4
New cards

What is mobile device management (MDM)?

A system for managing mobile devices, ensuring security and compliance.

5
New cards

What is the purpose of remote wipe in mobile security?

To erase all data on a device remotely in case it is lost or stolen.

6
New cards

What is a common issue with IoT devices?

Use of default credentials that can be exploited by attackers.

7
New cards

What does basic access control in OT environments refer to?

Restricting access to devices and networks to authorized users.

8
New cards

What is an S3 bucket exposure?

A public cloud storage misconfiguration that allows unauthorized access.

9
New cards

What command performs an aggressive Nmap scan?

nmap -A.

10
New cards

How do you display only HTTP traffic in Wireshark?

Use the display filter 'http'.

11
New cards

What command in Metasploit launches an exploit after configurations are done?

exploit.

12
New cards

What command blocks all incoming traffic in Linux?

iptables -A INPUT -j DROP.

13
New cards

What is the Nmap flag for a TCP SYN scan?

-sS.

14
New cards

What command sets the payload in Metasploit?

set PAYLOAD.

15
New cards

Which Wireshark filter extracts all TCP packets?

tcp.

16
New cards

What ADB command installs an APK file on an Android device?

adb install app.apk.

17
New cards

How do you show listening ports in Kali Linux?

Use the command 'ss -tuln'.

18
New cards

What command starts a Netcat listener on port 4444?

nc -lvp 4444.

19
New cards

What command scans all 65535 TCP ports in Nmap?

nmap -p-.

20
New cards

What ADB command pulls a file from an Android device?

adb pull.

21
New cards

How do you see available exploits in Metasploit?

show exploits.

22
New cards

What Wireshark filter shows only DNS traffic?

dns.

23
New cards

What command checks live TCP connections?

netstat -ant.

24
New cards

What iptables command deletes all rules in the INPUT chain?

iptables -F INPUT.

25
New cards

What command launches Wireshark from the Linux terminal?

wireshark.

26
New cards

What flag is used in Netcat for a reverse shell connection?

-e.

27
New cards

How do you list all connected devices in ADB?

adb devices.

28
New cards

What command shows information about the current Metasploit module?

info.

29
New cards