Deck 8: Wireless Network Security

ملء الشاشة (f)
exit full mode
سؤال
Because PEAP can be vulnerable to specific types of attacks, Cisco now recommends that users migrate to a more secure EAP than PEAP.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
____ is designed to detect any changes in a packet, whether accidental or intentional.

A) CBC
B) CRC
C) AES
D) TKIP
سؤال
Slave devices that are connected to the piconet and are sending transmissions are known as ____ slaves.

A) active
B) passive
C) hybrid
D) neutral
سؤال
The IEEE 802.15.1-2005 Wireless Personal Area Network standard was based on the ____ specifications.

A) Bluetooth v2.1
B) Bluetooth v1.2
C) Bluetooth v 1.0
D) Bluetooth v 1.1
سؤال
The SSID can generally be any alphanumeric string from 2 to ___ characters.

A) 23
B) 28
C) 32
D) 34
سؤال
Because of the weaknesses of WEP, it is possible for an attacker to identify two packets derived from the same IV.
سؤال
Bluetooth is a ____ technology designed for data communication over short distances.

A) Small Area Network
B) Private Area Network
C) Personal Area Network
D) Limited Area Network
سؤال
Bluetooth devices are not backward compatible with previous versions.
سؤال
APs use antennas that radiate a signal in all directions.
سؤال
____ is the encryption protocol standard for WPA2.

A) AES-CCMP
B) AES-CTR
C) AES-TKIP
D) AES-SCMP
سؤال
A ____ access point is an unauthorized AP that allows an attacker to bypass many of the network security configurations and opens the network and its users to attacks.

A) random
B) sanctioned
C) rogue
D) legitimate
سؤال
Because antennas are generally positioned to provide the broadest area of coverage, APs should be located at the end of the coverage area.
سؤال
____ is a framework for transporting authentication protocols instead of the authentication protocol itself.

A) PEAP
B) TKIP
C) SSL
D) EAP
سؤال
A group of piconets in which connections exist between different piconets is called a ____.

A) broadnet
B) honeynet
C) boundnet
D) scatternet
سؤال
When a device receives a beacon frame from an AP, the device then sends a frame known as a(n) ____ frame to the AP.

A) broadcast SSID
B) association request
C) disassociation request
D) connect request
سؤال
____ is an attack that accesses unauthorized information from a wireless device through a Bluetooth connection, often between cell phones and laptop computers.

A) Bluejacking
B) Bluecracking
C) Bluesnarfing
D) Bluetalking
سؤال
An ____ is an AP that is set up by an attacker.

A) active twin
B) authorized twin
C) internal replica
D) evil twin
سؤال
Most Bluetooth devices use a Class 2 radio that has a range of ____ feet.

A) 10
B) 18
C) 15
D) 33
سؤال
____ is an attack that sends unsolicited messages to Bluetooth-enabled devices.

A) Bluesnarfing
B) Bluejacking
C) Bluecracking
D) Bluetalking
سؤال
A(n) ____ acts as the "base station" for the wireless network.

A) AP
B) endpoint
C) WMM
D) ad-hoc peer
سؤال
____________________ technology enables users to connect wirelessly to a wide range of computing and telecommunications devices.
سؤال
If the EAP authentication is successful, a success packet is sent to the ____________________.
سؤال
Identify and describe two types of wireless probes.
سؤال
When using IEEE 802.1x authentication, ____________________ prevents an unauthenticated device, either wired or wireless, from receiving any network traffic until its identity can be verified.
سؤال
Explain why it is important to be able to control the power level at which the WLAN transmits.
سؤال
EAP request packets are issued by the ____.

A) supplicant
B) authenticator
C) authentication server
D) proxy
سؤال
A(n) ____ packet contains a field that indicates the function of the packet and an identifier field used to match requests and responses.

A) ICMP
B) TKIP
C) EAP
D) RADIUS
سؤال
____ allow a single access point to service different types of users.

A) Wireless VPNs
B) Wireless encryption standards
C) Wireless multimedia protocols
D) Wireless VLANs
سؤال
Discuss how to prevent bluesnarfing.
سؤال
Discuss the different types of interference one might encounter using wireless devices.
سؤال
Explain what war driving is.
سؤال
On a piconet, slave devices that are connected but are not actively participating are called ____________________ slaves.
سؤال
____ is considered a more flexible EAP scheme because it creates an encrypted channel between the client and the authentication server.

A) TKIP
B) LEAP
C) PEAP
D) ICMP
سؤال
____ access points are serious threats to network security because they allow attackers to intercept the RF signal and bypass network security to attack the network or capture sensitive data.

A) Legitimate
B) Rogue
C) Sanctioned
D) Twin
سؤال
____ requires mutual authentication used for WLAN encryption using Cisco client software.

A) LEAP
B) TKIP
C) EAP
D) PEAP
سؤال
List and describe the major parts of an access point.
سؤال
When a wireless device looks for beacon frames it is known as ____________________.
سؤال
What are the four types of packets used by EAP?
سؤال
Describe a piconet.
سؤال
Describe how wireless VLANs can be configured.
سؤال
Discuss how and why some organizations set up a wireless VLAN for employees and another for guests.
سؤال
Match between columns
A proprietary EAP method developed by Cisco Systems
SSID
A proprietary EAP method developed by Cisco Systems
Bluetooth
A proprietary EAP method developed by Cisco Systems
Evil twin
A proprietary EAP method developed by Cisco Systems
Initialization vector
A proprietary EAP method developed by Cisco Systems
War driving
A proprietary EAP method developed by Cisco Systems
War chalking
A proprietary EAP method developed by Cisco Systems
TKIP
A proprietary EAP method developed by Cisco Systems
Lightweight EAP
A proprietary EAP method developed by Cisco Systems
Protected EAP
Designed to simplify the deployment of 802.1x by using Microsoft Windows logins and passwords
SSID
Designed to simplify the deployment of 802.1x by using Microsoft Windows logins and passwords
Bluetooth
Designed to simplify the deployment of 802.1x by using Microsoft Windows logins and passwords
Evil twin
Designed to simplify the deployment of 802.1x by using Microsoft Windows logins and passwords
Initialization vector
Designed to simplify the deployment of 802.1x by using Microsoft Windows logins and passwords
War driving
Designed to simplify the deployment of 802.1x by using Microsoft Windows logins and passwords
War chalking
Designed to simplify the deployment of 802.1x by using Microsoft Windows logins and passwords
TKIP
Designed to simplify the deployment of 802.1x by using Microsoft Windows logins and passwords
Lightweight EAP
Designed to simplify the deployment of 802.1x by using Microsoft Windows logins and passwords
Protected EAP
A wireless technology that uses short-range radio frequency (RF) transmissions and provides for rapid ad hoc device pairings
SSID
A wireless technology that uses short-range radio frequency (RF) transmissions and provides for rapid ad hoc device pairings
Bluetooth
A wireless technology that uses short-range radio frequency (RF) transmissions and provides for rapid ad hoc device pairings
Evil twin
A wireless technology that uses short-range radio frequency (RF) transmissions and provides for rapid ad hoc device pairings
Initialization vector
A wireless technology that uses short-range radio frequency (RF) transmissions and provides for rapid ad hoc device pairings
War driving
A wireless technology that uses short-range radio frequency (RF) transmissions and provides for rapid ad hoc device pairings
War chalking
A wireless technology that uses short-range radio frequency (RF) transmissions and provides for rapid ad hoc device pairings
TKIP
A wireless technology that uses short-range radio frequency (RF) transmissions and provides for rapid ad hoc device pairings
Lightweight EAP
A wireless technology that uses short-range radio frequency (RF) transmissions and provides for rapid ad hoc device pairings
Protected EAP
A WPA encryption technology
SSID
A WPA encryption technology
Bluetooth
A WPA encryption technology
Evil twin
A WPA encryption technology
Initialization vector
A WPA encryption technology
War driving
A WPA encryption technology
War chalking
A WPA encryption technology
TKIP
A WPA encryption technology
Lightweight EAP
A WPA encryption technology
Protected EAP
The process of documenting and then advertising the location of wireless LANs for others to use
SSID
The process of documenting and then advertising the location of wireless LANs for others to use
Bluetooth
The process of documenting and then advertising the location of wireless LANs for others to use
Evil twin
The process of documenting and then advertising the location of wireless LANs for others to use
Initialization vector
The process of documenting and then advertising the location of wireless LANs for others to use
War driving
The process of documenting and then advertising the location of wireless LANs for others to use
War chalking
The process of documenting and then advertising the location of wireless LANs for others to use
TKIP
The process of documenting and then advertising the location of wireless LANs for others to use
Lightweight EAP
The process of documenting and then advertising the location of wireless LANs for others to use
Protected EAP
Searching for wireless signals from an automobile or on foot using a portable computing device
SSID
Searching for wireless signals from an automobile or on foot using a portable computing device
Bluetooth
Searching for wireless signals from an automobile or on foot using a portable computing device
Evil twin
Searching for wireless signals from an automobile or on foot using a portable computing device
Initialization vector
Searching for wireless signals from an automobile or on foot using a portable computing device
War driving
Searching for wireless signals from an automobile or on foot using a portable computing device
War chalking
Searching for wireless signals from an automobile or on foot using a portable computing device
TKIP
Searching for wireless signals from an automobile or on foot using a portable computing device
Lightweight EAP
Searching for wireless signals from an automobile or on foot using a portable computing device
Protected EAP
An AP set up by an attacker to mimic an authorized AP and capture transmissions
SSID
An AP set up by an attacker to mimic an authorized AP and capture transmissions
Bluetooth
An AP set up by an attacker to mimic an authorized AP and capture transmissions
Evil twin
An AP set up by an attacker to mimic an authorized AP and capture transmissions
Initialization vector
An AP set up by an attacker to mimic an authorized AP and capture transmissions
War driving
An AP set up by an attacker to mimic an authorized AP and capture transmissions
War chalking
An AP set up by an attacker to mimic an authorized AP and capture transmissions
TKIP
An AP set up by an attacker to mimic an authorized AP and capture transmissions
Lightweight EAP
An AP set up by an attacker to mimic an authorized AP and capture transmissions
Protected EAP
A 24-bit value used in WEP that changes each time a packet is encrypted
SSID
A 24-bit value used in WEP that changes each time a packet is encrypted
Bluetooth
A 24-bit value used in WEP that changes each time a packet is encrypted
Evil twin
A 24-bit value used in WEP that changes each time a packet is encrypted
Initialization vector
A 24-bit value used in WEP that changes each time a packet is encrypted
War driving
A 24-bit value used in WEP that changes each time a packet is encrypted
War chalking
A 24-bit value used in WEP that changes each time a packet is encrypted
TKIP
A 24-bit value used in WEP that changes each time a packet is encrypted
Lightweight EAP
A 24-bit value used in WEP that changes each time a packet is encrypted
Protected EAP
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/42
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 8: Wireless Network Security
1
Because PEAP can be vulnerable to specific types of attacks, Cisco now recommends that users migrate to a more secure EAP than PEAP.
False
2
____ is designed to detect any changes in a packet, whether accidental or intentional.

A) CBC
B) CRC
C) AES
D) TKIP
B
3
Slave devices that are connected to the piconet and are sending transmissions are known as ____ slaves.

A) active
B) passive
C) hybrid
D) neutral
A
4
The IEEE 802.15.1-2005 Wireless Personal Area Network standard was based on the ____ specifications.

A) Bluetooth v2.1
B) Bluetooth v1.2
C) Bluetooth v 1.0
D) Bluetooth v 1.1
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
5
The SSID can generally be any alphanumeric string from 2 to ___ characters.

A) 23
B) 28
C) 32
D) 34
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
6
Because of the weaknesses of WEP, it is possible for an attacker to identify two packets derived from the same IV.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
7
Bluetooth is a ____ technology designed for data communication over short distances.

A) Small Area Network
B) Private Area Network
C) Personal Area Network
D) Limited Area Network
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
8
Bluetooth devices are not backward compatible with previous versions.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
9
APs use antennas that radiate a signal in all directions.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
10
____ is the encryption protocol standard for WPA2.

A) AES-CCMP
B) AES-CTR
C) AES-TKIP
D) AES-SCMP
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
11
A ____ access point is an unauthorized AP that allows an attacker to bypass many of the network security configurations and opens the network and its users to attacks.

A) random
B) sanctioned
C) rogue
D) legitimate
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
12
Because antennas are generally positioned to provide the broadest area of coverage, APs should be located at the end of the coverage area.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
13
____ is a framework for transporting authentication protocols instead of the authentication protocol itself.

A) PEAP
B) TKIP
C) SSL
D) EAP
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
14
A group of piconets in which connections exist between different piconets is called a ____.

A) broadnet
B) honeynet
C) boundnet
D) scatternet
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
15
When a device receives a beacon frame from an AP, the device then sends a frame known as a(n) ____ frame to the AP.

A) broadcast SSID
B) association request
C) disassociation request
D) connect request
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
16
____ is an attack that accesses unauthorized information from a wireless device through a Bluetooth connection, often between cell phones and laptop computers.

A) Bluejacking
B) Bluecracking
C) Bluesnarfing
D) Bluetalking
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
17
An ____ is an AP that is set up by an attacker.

A) active twin
B) authorized twin
C) internal replica
D) evil twin
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
18
Most Bluetooth devices use a Class 2 radio that has a range of ____ feet.

A) 10
B) 18
C) 15
D) 33
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
19
____ is an attack that sends unsolicited messages to Bluetooth-enabled devices.

A) Bluesnarfing
B) Bluejacking
C) Bluecracking
D) Bluetalking
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
20
A(n) ____ acts as the "base station" for the wireless network.

A) AP
B) endpoint
C) WMM
D) ad-hoc peer
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
21
____________________ technology enables users to connect wirelessly to a wide range of computing and telecommunications devices.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
22
If the EAP authentication is successful, a success packet is sent to the ____________________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
23
Identify and describe two types of wireless probes.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
24
When using IEEE 802.1x authentication, ____________________ prevents an unauthenticated device, either wired or wireless, from receiving any network traffic until its identity can be verified.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
25
Explain why it is important to be able to control the power level at which the WLAN transmits.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
26
EAP request packets are issued by the ____.

A) supplicant
B) authenticator
C) authentication server
D) proxy
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
27
A(n) ____ packet contains a field that indicates the function of the packet and an identifier field used to match requests and responses.

A) ICMP
B) TKIP
C) EAP
D) RADIUS
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
28
____ allow a single access point to service different types of users.

A) Wireless VPNs
B) Wireless encryption standards
C) Wireless multimedia protocols
D) Wireless VLANs
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
29
Discuss how to prevent bluesnarfing.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
30
Discuss the different types of interference one might encounter using wireless devices.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
31
Explain what war driving is.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
32
On a piconet, slave devices that are connected but are not actively participating are called ____________________ slaves.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
33
____ is considered a more flexible EAP scheme because it creates an encrypted channel between the client and the authentication server.

A) TKIP
B) LEAP
C) PEAP
D) ICMP
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
34
____ access points are serious threats to network security because they allow attackers to intercept the RF signal and bypass network security to attack the network or capture sensitive data.

A) Legitimate
B) Rogue
C) Sanctioned
D) Twin
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
35
____ requires mutual authentication used for WLAN encryption using Cisco client software.

A) LEAP
B) TKIP
C) EAP
D) PEAP
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
36
List and describe the major parts of an access point.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
37
When a wireless device looks for beacon frames it is known as ____________________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
38
What are the four types of packets used by EAP?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
39
Describe a piconet.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
40
Describe how wireless VLANs can be configured.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
41
Discuss how and why some organizations set up a wireless VLAN for employees and another for guests.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
42
Match between columns
A proprietary EAP method developed by Cisco Systems
SSID
A proprietary EAP method developed by Cisco Systems
Bluetooth
A proprietary EAP method developed by Cisco Systems
Evil twin
A proprietary EAP method developed by Cisco Systems
Initialization vector
A proprietary EAP method developed by Cisco Systems
War driving
A proprietary EAP method developed by Cisco Systems
War chalking
A proprietary EAP method developed by Cisco Systems
TKIP
A proprietary EAP method developed by Cisco Systems
Lightweight EAP
A proprietary EAP method developed by Cisco Systems
Protected EAP
Designed to simplify the deployment of 802.1x by using Microsoft Windows logins and passwords
SSID
Designed to simplify the deployment of 802.1x by using Microsoft Windows logins and passwords
Bluetooth
Designed to simplify the deployment of 802.1x by using Microsoft Windows logins and passwords
Evil twin
Designed to simplify the deployment of 802.1x by using Microsoft Windows logins and passwords
Initialization vector
Designed to simplify the deployment of 802.1x by using Microsoft Windows logins and passwords
War driving
Designed to simplify the deployment of 802.1x by using Microsoft Windows logins and passwords
War chalking
Designed to simplify the deployment of 802.1x by using Microsoft Windows logins and passwords
TKIP
Designed to simplify the deployment of 802.1x by using Microsoft Windows logins and passwords
Lightweight EAP
Designed to simplify the deployment of 802.1x by using Microsoft Windows logins and passwords
Protected EAP
A wireless technology that uses short-range radio frequency (RF) transmissions and provides for rapid ad hoc device pairings
SSID
A wireless technology that uses short-range radio frequency (RF) transmissions and provides for rapid ad hoc device pairings
Bluetooth
A wireless technology that uses short-range radio frequency (RF) transmissions and provides for rapid ad hoc device pairings
Evil twin
A wireless technology that uses short-range radio frequency (RF) transmissions and provides for rapid ad hoc device pairings
Initialization vector
A wireless technology that uses short-range radio frequency (RF) transmissions and provides for rapid ad hoc device pairings
War driving
A wireless technology that uses short-range radio frequency (RF) transmissions and provides for rapid ad hoc device pairings
War chalking
A wireless technology that uses short-range radio frequency (RF) transmissions and provides for rapid ad hoc device pairings
TKIP
A wireless technology that uses short-range radio frequency (RF) transmissions and provides for rapid ad hoc device pairings
Lightweight EAP
A wireless technology that uses short-range radio frequency (RF) transmissions and provides for rapid ad hoc device pairings
Protected EAP
A WPA encryption technology
SSID
A WPA encryption technology
Bluetooth
A WPA encryption technology
Evil twin
A WPA encryption technology
Initialization vector
A WPA encryption technology
War driving
A WPA encryption technology
War chalking
A WPA encryption technology
TKIP
A WPA encryption technology
Lightweight EAP
A WPA encryption technology
Protected EAP
The process of documenting and then advertising the location of wireless LANs for others to use
SSID
The process of documenting and then advertising the location of wireless LANs for others to use
Bluetooth
The process of documenting and then advertising the location of wireless LANs for others to use
Evil twin
The process of documenting and then advertising the location of wireless LANs for others to use
Initialization vector
The process of documenting and then advertising the location of wireless LANs for others to use
War driving
The process of documenting and then advertising the location of wireless LANs for others to use
War chalking
The process of documenting and then advertising the location of wireless LANs for others to use
TKIP
The process of documenting and then advertising the location of wireless LANs for others to use
Lightweight EAP
The process of documenting and then advertising the location of wireless LANs for others to use
Protected EAP
Searching for wireless signals from an automobile or on foot using a portable computing device
SSID
Searching for wireless signals from an automobile or on foot using a portable computing device
Bluetooth
Searching for wireless signals from an automobile or on foot using a portable computing device
Evil twin
Searching for wireless signals from an automobile or on foot using a portable computing device
Initialization vector
Searching for wireless signals from an automobile or on foot using a portable computing device
War driving
Searching for wireless signals from an automobile or on foot using a portable computing device
War chalking
Searching for wireless signals from an automobile or on foot using a portable computing device
TKIP
Searching for wireless signals from an automobile or on foot using a portable computing device
Lightweight EAP
Searching for wireless signals from an automobile or on foot using a portable computing device
Protected EAP
An AP set up by an attacker to mimic an authorized AP and capture transmissions
SSID
An AP set up by an attacker to mimic an authorized AP and capture transmissions
Bluetooth
An AP set up by an attacker to mimic an authorized AP and capture transmissions
Evil twin
An AP set up by an attacker to mimic an authorized AP and capture transmissions
Initialization vector
An AP set up by an attacker to mimic an authorized AP and capture transmissions
War driving
An AP set up by an attacker to mimic an authorized AP and capture transmissions
War chalking
An AP set up by an attacker to mimic an authorized AP and capture transmissions
TKIP
An AP set up by an attacker to mimic an authorized AP and capture transmissions
Lightweight EAP
An AP set up by an attacker to mimic an authorized AP and capture transmissions
Protected EAP
A 24-bit value used in WEP that changes each time a packet is encrypted
SSID
A 24-bit value used in WEP that changes each time a packet is encrypted
Bluetooth
A 24-bit value used in WEP that changes each time a packet is encrypted
Evil twin
A 24-bit value used in WEP that changes each time a packet is encrypted
Initialization vector
A 24-bit value used in WEP that changes each time a packet is encrypted
War driving
A 24-bit value used in WEP that changes each time a packet is encrypted
War chalking
A 24-bit value used in WEP that changes each time a packet is encrypted
TKIP
A 24-bit value used in WEP that changes each time a packet is encrypted
Lightweight EAP
A 24-bit value used in WEP that changes each time a packet is encrypted
Protected EAP
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.