click below
click below
Normal Size Small Size show me how
SecurityCHPT8
terms
| Question | Answer |
|---|---|
| bluetooth | wireless technology that uses short range radio frequency rf transmissions and provides for rapid ad hoc device pairings |
| bluetooth | personal area network technology |
| bluetooth network technologies | piconet |
| piconet | |
| scatternet | |
| bluejacking | attack that sends unsolicited messages to bluetooth enabled devices |
| bluesnarfing | attack that accesses unauthorized information from a wireless device thru a bluetooth connection |
| IEEE 802.11n improvements | speed |
| IEEE 802.11n improvements | coverage area |
| IEEE 802.11n improvements | interference |
| IEEE 802.11n improvements | security |
| access point contains three major parts | antenna and radio transmitter to send and receive wireless signals |
| access point contains three major parts | special bridging software to interface wireless devices to other devices |
| access point contains three major parts | a wired network interface that allows it to connect by cable to a standard wired network |
| an access point has two functions | acts as the base station for the wireless network |
| an access point has two functions | act as a bridge between the wireless and wired networks |
| war driving tools | mobile computing device |
| war driving tools | wireless nic adapter |
| war driving tools | antennas |
| war driving tools | software |
| war driving tools | gps receiver |
| war driving | searching for wireless signals from a car or on foot using a portable computing device |
| war chalking | wireless networks were identified by drawing on sidewalks or walls around the area of the network |
| autonomous APs device features | firewall |
| autonomous APs device features | router |
| autonomous APs device features | dhcp |
| wireless lan attacks can be categorized as attacks based on | discovering the network |
| wireless lan attacks can be categorized as attacks based on | attacks thru radio frequency spectrum |
| wireless lan attacks can be categorized as attacks based on | attacks involving access points |