Match each item with a statement below.

A. Monitors the airwaves for any new devices or access points.
B. A free, client-based network protocol analyzer.
C. An enhanced Web scanner that, among other things, scans an entire Web site for valuable pieces of information, such as server names and e-mail addresses.
D. Designed to crack WEP and WPA-PSK keys to allow packet sniffing and wireless network auditing.
E. Uses incrementing Time-to-Live (TTL) packets to determine the path into a network as well as the default firewall policy.
F. Uses ICMP to determine the remote OS.
G. When run with the -sI switch, it allows you to bounce your scan across a firewall by using one of the idle DMZ hosts as the initiator of the scan.
H. A UNIX or Linux systems support tool that allows a remote individual to "mirror" entire Web sites.
I. A freeware tool that applies packet sniffing to wireless networks.


A. AirSnare
B. Wireshark
C. Sam Spade
D. Aircrack-ng
E. Firewalk
F. XProbe2
G. Nmap "Idle scanning" option
H. Wget
I. NetStumbler

Computer Science & Information Technology

You might also like to view...

Sorting alphabetically from A to Z or ordering numerically from smallest to largest is known as ________ order

A) Ascending B) Descending C) alphabetical D) numerical

Computer Science & Information Technology

The IP range 10.x.x.x provides about ____ addresses.

A. 16.5 billion B. 16.5 million C. 1.05 million D. 65,500

Computer Science & Information Technology

Following ____, the compiler makes a second pass over the parse tree to produce the translated code.

A. semantic analysis B. lexical analysis C. code optimization D. code generation

Computer Science & Information Technology

A user receives an unsolicited call from a technician claiming to be from a Microsoft certified partner. The technician tricks the user into allowing them access to their PC because of malware alerts that were being broadcasted. Which of the following attacks is this user a victim of?

A. Shoulder surfing B. Phishing attack C. Social engineering D. Malware infection

Computer Science & Information Technology