SecurityCHPT8 Word Scramble
|
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.
Normal Size Small Size show me how
Normal Size Small Size show me how
Question | Answer |
bluetooth | wireless technology that uses short range radio frequency rf transmissions and provides for rapid ad hoc device pairings |
bluetooth | personal area network technology |
bluetooth network technologies | piconet |
piconet | |
scatternet | |
bluejacking | attack that sends unsolicited messages to bluetooth enabled devices |
bluesnarfing | attack that accesses unauthorized information from a wireless device thru a bluetooth connection |
IEEE 802.11n improvements | speed |
IEEE 802.11n improvements | coverage area |
IEEE 802.11n improvements | interference |
IEEE 802.11n improvements | security |
access point contains three major parts | antenna and radio transmitter to send and receive wireless signals |
access point contains three major parts | special bridging software to interface wireless devices to other devices |
access point contains three major parts | a wired network interface that allows it to connect by cable to a standard wired network |
an access point has two functions | acts as the base station for the wireless network |
an access point has two functions | act as a bridge between the wireless and wired networks |
war driving tools | mobile computing device |
war driving tools | wireless nic adapter |
war driving tools | antennas |
war driving tools | software |
war driving tools | gps receiver |
war driving | searching for wireless signals from a car or on foot using a portable computing device |
war chalking | wireless networks were identified by drawing on sidewalks or walls around the area of the network |
autonomous APs device features | firewall |
autonomous APs device features | router |
autonomous APs device features | dhcp |
wireless lan attacks can be categorized as attacks based on | discovering the network |
wireless lan attacks can be categorized as attacks based on | attacks thru radio frequency spectrum |
wireless lan attacks can be categorized as attacks based on | attacks involving access points |
Created by:
cgeaski
Popular Computers sets