Busy. Please wait.
or

show password
Forgot Password?

Don't have an account?  Sign up 
or

Username is available taken
show password

why


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
We do not share your email address with others. It is only used to allow you to reset your password. For details read our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.

Remove ads
Don't know
Know
remaining cards
Save
0:01
To flip the current card, click it or press the Spacebar key.  To move the current card to one of the three colored boxes, click on the box.  You may also press the UP ARROW key to move the card to the "Know" box, the DOWN ARROW key to move the card to the "Don't know" box, or the RIGHT ARROW key to move the card to the Remaining box.  You may also click on the card displayed in any of the three boxes to bring that card back to the center.

Pass complete!

"Know" box contains:
Time elapsed:
Retries:
restart all cards




share
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

SecurityCHPT8

terms

QuestionAnswer
bluetooth wireless technology that uses short range radio frequency rf transmissions and provides for rapid ad hoc device pairings
bluetooth personal area network technology
bluetooth network technologies piconet
piconet
scatternet
bluejacking attack that sends unsolicited messages to bluetooth enabled devices
bluesnarfing attack that accesses unauthorized information from a wireless device thru a bluetooth connection
IEEE 802.11n improvements speed
IEEE 802.11n improvements coverage area
IEEE 802.11n improvements interference
IEEE 802.11n improvements security
access point contains three major parts antenna and radio transmitter to send and receive wireless signals
access point contains three major parts special bridging software to interface wireless devices to other devices
access point contains three major parts a wired network interface that allows it to connect by cable to a standard wired network
an access point has two functions acts as the base station for the wireless network
an access point has two functions act as a bridge between the wireless and wired networks
war driving tools mobile computing device
war driving tools wireless nic adapter
war driving tools antennas
war driving tools software
war driving tools gps receiver
war driving searching for wireless signals from a car or on foot using a portable computing device
war chalking wireless networks were identified by drawing on sidewalks or walls around the area of the network
autonomous APs device features firewall
autonomous APs device features router
autonomous APs device features dhcp
wireless lan attacks can be categorized as attacks based on discovering the network
wireless lan attacks can be categorized as attacks based on attacks thru radio frequency spectrum
wireless lan attacks can be categorized as attacks based on attacks involving access points
Created by: cgeaski