1, A……. is a type of attack where an unauthorized user monitors communications to gather information. 2, ……. on wireless networks are similar to those on wired networks, in which an attacker tries to alter or corrupt the data or services on a network. 3 ,To find additional wireless devices on the network that may not be readily apparent, the investigator can put his or her forensic laptop in promiscuous mode and send deauthentication packets using the Aireplay tool found in the………….. portion of the Backtrack folder. 4, ……… is a Windows utility that is often used for wardriving. 5, ………. is the smaller sibling of NetStumbler. 6, …………. is completely passive and is capable of detecting traffic from WAPs and wireless clients. 7, ………. is a free network protocol analyzer for UNIX, Linux, Mac OS X, and Windows. 8,………. is a command-line network-debugging tools. 9, A ……… is a client-based software program that enables a user to display and interact with text, images, videos, music, games, and other information generally written in hypertext markup language (HTML) and displayed as a Web page on a Web site or on a local area network. 10, …….. Visited Web pages are recorded by the browser along with the time and date. 11,……… Firefox remembers what files have been downloaded while browsing if the Remember what I’ve downloaded check box is checked. 12, ………. The contents of pages viewed once are stored in a special temporary folder so that if the user wants to view the page again, it can be accessed locally from the cache rather than redownloaded. 13, Some Web sites save small text files, called ………, to the user’s hard drive. 14, ……. automatically scans a computer, looking for cookies created by Internet Explorer, Mozilla Firefox, and Netscape Navigator, and then displays the data stored in each one. 15, …….. is a modified version of the Cookie Manager built into the Firefox browser. 16,……… : Opera supports Secure Socket Layer (SSL) version 2 and 3, and TLS. 17, ……… : Opera gives the user detailed control of what cookies to accept and reject, such as allowing different setup for different servers. 18, ……. Opera’s advanced fraud protection protects the user against Web sites that try to steal his or her personal information. 19,……. Opera can be configured to clear the history and cache when exiting, to protect the user’s privacy. 20,…….. Opera displays security information inside the address bar.