Deck 3: Passive Wireless Discovery

ملء الشاشة (f)
exit full mode
سؤال
Passive wireless discovery through wardriving is in itself an illegal activity.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
____ relies on tricking and deceiving someone to access a system.

A) Social engineering
B) Wardriving
C) Warchalking
D) Wireless site mapping
سؤال
____ is a version of NetStumbler that runs on handheld devices.

A) KisMAC
B) MiniStumbler
C) AiroPeek
D) Kismet
سؤال
The informal expression used more often for searching for RF signals is ____.

A) phishing
B) pharming
C) beaconing
D) wardriving
سؤال
NetStumbler can capture and decode wireless packets, monitor utilization, or make automatic connections to networks it discovers.
سؤال
Instead of asking the user to visit a fraudulent Web site, ____ automatically redirects the user to the fake site.

A) spear phishing
B) phishing
C) pharming
D) Google phishing
سؤال
____ is a type of solid-state (microchip) technology in which there are no moving parts.

A) Flash memory
B) Sled
C) Mini PCI
D) Type II PC card
سؤال
____ is a passive method of receiving WLAN signals.

A) CDMA
B) RFMON
C) SDIO NOW!
D) Sled
سؤال
The hardware that allows the mobile computing device to detect a wireless signal is a(n) ____.

A) access point card
B) CompactFlash card
C) flash memory
D) wireless network interface card
سؤال
Most phishing sites only function for three to five days to prevent law enforcement agencies from tracking the attackers.
سؤال
Many of the functions of a PDA are now incorporated into cellular telephones sometimes called ____.

A) smartphones
B) handheld PCs
C) tablet computers
D) slate computers
سؤال
____ targets only specific users.

A) Google pharming
B) Spear phishing
C) Pharming
D) Google phishing
سؤال
A significant advantage of using PDAs is their ability to synchronize data with another computer.
سؤال
____ involves sending an e-mail or displaying a Web announcement that falsely claims to be from a legitimate enterprise in an attempt to trick the user into surrendering information.

A) Wardriving
B) Dumpster diving
C) Warchalking
D) Phishing
سؤال
____ antennas send a narrowly focused signal beam.

A) Cyclic directional
B) Omni-directional
C) Semi-directional
D) Highly directional
سؤال
A(n) ____ PC is small enough to be held in a single hand yet has many of the features of a laptop computer.

A) PCMCIA
B) Tablet
C) handheld
D) slate
سؤال
At regular intervals (normally every 100 ms) the wireless access point sends a beacon frame to announce its presence and to provide the necessary information for devices that want to join the network. This process is known as ____.

A) phishing
B) beaconing
C) pharming
D) mapping
سؤال
Wardriving software that is specifically designed to pick up a radio frequency WLAN signal is known as a ____.

A) sled
B) client utility
C) freeware discovery application
D) WZC
سؤال
A(n) ____ antenna focuses the energy in one direction.

A) cyclic directional
B) omni-directional
C) semi-directional
D) highly directional
سؤال
Promiscuous mode will not work on a WLAN.
سؤال
Known as ____, these attackers lack the technical skills of more advanced users and are sometimes considered more dangerous.

A) hackers
B) script kiddies
C) crackers
D) warchalkers
سؤال
What are some of the techniques used by wardrivers to locate RF signals?
سؤال
What are some of the ways to recognize phishing messages?
سؤال
____________________ is the formal expression used to refer to the process of finding a WLAN signal and recording information about it.
سؤال
____ allows computers and network equipment to gather data about network performance.

A) ICMP
B) SMTP
C) FTP
D) SNMP
سؤال
The first two versions of SNMP, SNMPv1 and SNMPv2, used ____ that acted like a password to allow or deny access to the information that was collected.

A) community strings
B) management information base (MIB)
C) packet sniffers
D) flash memories
سؤال
Wireless networks were identified by drawing on sidewalks or walls around the area of the network known as ____.

A) warchalking
B) phishing
C) pharming
D) dumpster diving
سؤال
What are some of the security problems related to improperly recycled equipment?
سؤال
A wired NIC can be set to ____________________, which turns off the filtering mechanism and allows it to capture all the packets it receives.
سؤال
Describe two examples of social engineering attacks.
سؤال
____________________ involves phishers setting up their own search engines to direct traffic to illegitimate sites.
سؤال
What are some of the options for wireless NICs available for smaller devices like handheld PCs and PDAs?
سؤال
Each SNMP agent monitors network traffic and stores that information in its ____.

A) community strings
B) packet sniffer
C) management information base (MIB)
D) Type II PC card
سؤال
The GPS receiver can deduce its own location based on a mathematical principle called ____________________.
سؤال
What are the main characteristics of WLAN client utilities?
سؤال
The smallest mobile computing device is a(n) ____________________.
سؤال
What are the two fundamental characteristics of antennas?
سؤال
____, which runs under the Linux operating system, can report similar information as NetStumbler, such as the SSID.

A) Kismet
B) KisMAC
C) WZC
D) GPSMac
سؤال
Briefly describe the main characteristics of a tablet computer.
سؤال
Briefly describe a wireless packet sniffer.
سؤال
Briefly describe a packet sniffer.
سؤال
Match between columns
group of integrated circuits that provide the functionality of the wireless NIC.
Omni-directional antenna
group of integrated circuits that provide the functionality of the wireless NIC.
Phishing
group of integrated circuits that provide the functionality of the wireless NIC.
IPSec
group of integrated circuits that provide the functionality of the wireless NIC.
Chipset
group of integrated circuits that provide the functionality of the wireless NIC.
SNMP management station
group of integrated circuits that provide the functionality of the wireless NIC.
Handheld PC
group of integrated circuits that provide the functionality of the wireless NIC.
Dumpster diving
group of integrated circuits that provide the functionality of the wireless NIC.
Mini PCI
group of integrated circuits that provide the functionality of the wireless NIC.
Wireless Zero Configuration (WZC)
communicates with the software agents on each network device and collects the data stored in the MIBs.
Omni-directional antenna
communicates with the software agents on each network device and collects the data stored in the MIBs.
Phishing
communicates with the software agents on each network device and collects the data stored in the MIBs.
IPSec
communicates with the software agents on each network device and collects the data stored in the MIBs.
Chipset
communicates with the software agents on each network device and collects the data stored in the MIBs.
SNMP management station
communicates with the software agents on each network device and collects the data stored in the MIBs.
Handheld PC
communicates with the software agents on each network device and collects the data stored in the MIBs.
Dumpster diving
communicates with the software agents on each network device and collects the data stored in the MIBs.
Mini PCI
communicates with the software agents on each network device and collects the data stored in the MIBs.
Wireless Zero Configuration (WZC)
detects signals from all directions equally.
Omni-directional antenna
detects signals from all directions equally.
Phishing
detects signals from all directions equally.
IPSec
detects signals from all directions equally.
Chipset
detects signals from all directions equally.
SNMP management station
detects signals from all directions equally.
Handheld PC
detects signals from all directions equally.
Dumpster diving
detects signals from all directions equally.
Mini PCI
detects signals from all directions equally.
Wireless Zero Configuration (WZC)
set of protocols developed to support the secure exchange of packets.
Omni-directional antenna
set of protocols developed to support the secure exchange of packets.
Phishing
set of protocols developed to support the secure exchange of packets.
IPSec
set of protocols developed to support the secure exchange of packets.
Chipset
set of protocols developed to support the secure exchange of packets.
SNMP management station
set of protocols developed to support the secure exchange of packets.
Handheld PC
set of protocols developed to support the secure exchange of packets.
Dumpster diving
set of protocols developed to support the secure exchange of packets.
Mini PCI
set of protocols developed to support the secure exchange of packets.
Wireless Zero Configuration (WZC)
looking through large (usually outdoor) trash receptacles.
Omni-directional antenna
looking through large (usually outdoor) trash receptacles.
Phishing
looking through large (usually outdoor) trash receptacles.
IPSec
looking through large (usually outdoor) trash receptacles.
Chipset
looking through large (usually outdoor) trash receptacles.
SNMP management station
looking through large (usually outdoor) trash receptacles.
Handheld PC
looking through large (usually outdoor) trash receptacles.
Dumpster diving
looking through large (usually outdoor) trash receptacles.
Mini PCI
looking through large (usually outdoor) trash receptacles.
Wireless Zero Configuration (WZC)
designed to provide the familiar applications from a desktop computer in a mobile format.
Omni-directional antenna
designed to provide the familiar applications from a desktop computer in a mobile format.
Phishing
designed to provide the familiar applications from a desktop computer in a mobile format.
IPSec
designed to provide the familiar applications from a desktop computer in a mobile format.
Chipset
designed to provide the familiar applications from a desktop computer in a mobile format.
SNMP management station
designed to provide the familiar applications from a desktop computer in a mobile format.
Handheld PC
designed to provide the familiar applications from a desktop computer in a mobile format.
Dumpster diving
designed to provide the familiar applications from a desktop computer in a mobile format.
Mini PCI
designed to provide the familiar applications from a desktop computer in a mobile format.
Wireless Zero Configuration (WZC)
integrated operating system tool for a Windows-based computer.
Omni-directional antenna
integrated operating system tool for a Windows-based computer.
Phishing
integrated operating system tool for a Windows-based computer.
IPSec
integrated operating system tool for a Windows-based computer.
Chipset
integrated operating system tool for a Windows-based computer.
SNMP management station
integrated operating system tool for a Windows-based computer.
Handheld PC
integrated operating system tool for a Windows-based computer.
Dumpster diving
integrated operating system tool for a Windows-based computer.
Mini PCI
integrated operating system tool for a Windows-based computer.
Wireless Zero Configuration (WZC)
small card that is functionally equivalent to a standard PCI expansion card.
Omni-directional antenna
small card that is functionally equivalent to a standard PCI expansion card.
Phishing
small card that is functionally equivalent to a standard PCI expansion card.
IPSec
small card that is functionally equivalent to a standard PCI expansion card.
Chipset
small card that is functionally equivalent to a standard PCI expansion card.
SNMP management station
small card that is functionally equivalent to a standard PCI expansion card.
Handheld PC
small card that is functionally equivalent to a standard PCI expansion card.
Dumpster diving
small card that is functionally equivalent to a standard PCI expansion card.
Mini PCI
small card that is functionally equivalent to a standard PCI expansion card.
Wireless Zero Configuration (WZC)
an electronic version of social engineering.
Omni-directional antenna
an electronic version of social engineering.
Phishing
an electronic version of social engineering.
IPSec
an electronic version of social engineering.
Chipset
an electronic version of social engineering.
SNMP management station
an electronic version of social engineering.
Handheld PC
an electronic version of social engineering.
Dumpster diving
an electronic version of social engineering.
Mini PCI
an electronic version of social engineering.
Wireless Zero Configuration (WZC)
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/42
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 3: Passive Wireless Discovery
1
Passive wireless discovery through wardriving is in itself an illegal activity.
False
2
____ relies on tricking and deceiving someone to access a system.

A) Social engineering
B) Wardriving
C) Warchalking
D) Wireless site mapping
A
3
____ is a version of NetStumbler that runs on handheld devices.

A) KisMAC
B) MiniStumbler
C) AiroPeek
D) Kismet
B
4
The informal expression used more often for searching for RF signals is ____.

A) phishing
B) pharming
C) beaconing
D) wardriving
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
5
NetStumbler can capture and decode wireless packets, monitor utilization, or make automatic connections to networks it discovers.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
6
Instead of asking the user to visit a fraudulent Web site, ____ automatically redirects the user to the fake site.

A) spear phishing
B) phishing
C) pharming
D) Google phishing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
7
____ is a type of solid-state (microchip) technology in which there are no moving parts.

A) Flash memory
B) Sled
C) Mini PCI
D) Type II PC card
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
8
____ is a passive method of receiving WLAN signals.

A) CDMA
B) RFMON
C) SDIO NOW!
D) Sled
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
9
The hardware that allows the mobile computing device to detect a wireless signal is a(n) ____.

A) access point card
B) CompactFlash card
C) flash memory
D) wireless network interface card
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
10
Most phishing sites only function for three to five days to prevent law enforcement agencies from tracking the attackers.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
11
Many of the functions of a PDA are now incorporated into cellular telephones sometimes called ____.

A) smartphones
B) handheld PCs
C) tablet computers
D) slate computers
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
12
____ targets only specific users.

A) Google pharming
B) Spear phishing
C) Pharming
D) Google phishing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
13
A significant advantage of using PDAs is their ability to synchronize data with another computer.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
14
____ involves sending an e-mail or displaying a Web announcement that falsely claims to be from a legitimate enterprise in an attempt to trick the user into surrendering information.

A) Wardriving
B) Dumpster diving
C) Warchalking
D) Phishing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
15
____ antennas send a narrowly focused signal beam.

A) Cyclic directional
B) Omni-directional
C) Semi-directional
D) Highly directional
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
16
A(n) ____ PC is small enough to be held in a single hand yet has many of the features of a laptop computer.

A) PCMCIA
B) Tablet
C) handheld
D) slate
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
17
At regular intervals (normally every 100 ms) the wireless access point sends a beacon frame to announce its presence and to provide the necessary information for devices that want to join the network. This process is known as ____.

A) phishing
B) beaconing
C) pharming
D) mapping
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
18
Wardriving software that is specifically designed to pick up a radio frequency WLAN signal is known as a ____.

A) sled
B) client utility
C) freeware discovery application
D) WZC
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
19
A(n) ____ antenna focuses the energy in one direction.

A) cyclic directional
B) omni-directional
C) semi-directional
D) highly directional
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
20
Promiscuous mode will not work on a WLAN.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
21
Known as ____, these attackers lack the technical skills of more advanced users and are sometimes considered more dangerous.

A) hackers
B) script kiddies
C) crackers
D) warchalkers
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
22
What are some of the techniques used by wardrivers to locate RF signals?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
23
What are some of the ways to recognize phishing messages?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
24
____________________ is the formal expression used to refer to the process of finding a WLAN signal and recording information about it.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
25
____ allows computers and network equipment to gather data about network performance.

A) ICMP
B) SMTP
C) FTP
D) SNMP
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
26
The first two versions of SNMP, SNMPv1 and SNMPv2, used ____ that acted like a password to allow or deny access to the information that was collected.

A) community strings
B) management information base (MIB)
C) packet sniffers
D) flash memories
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
27
Wireless networks were identified by drawing on sidewalks or walls around the area of the network known as ____.

A) warchalking
B) phishing
C) pharming
D) dumpster diving
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
28
What are some of the security problems related to improperly recycled equipment?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
29
A wired NIC can be set to ____________________, which turns off the filtering mechanism and allows it to capture all the packets it receives.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
30
Describe two examples of social engineering attacks.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
31
____________________ involves phishers setting up their own search engines to direct traffic to illegitimate sites.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
32
What are some of the options for wireless NICs available for smaller devices like handheld PCs and PDAs?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
33
Each SNMP agent monitors network traffic and stores that information in its ____.

A) community strings
B) packet sniffer
C) management information base (MIB)
D) Type II PC card
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
34
The GPS receiver can deduce its own location based on a mathematical principle called ____________________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
35
What are the main characteristics of WLAN client utilities?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
36
The smallest mobile computing device is a(n) ____________________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
37
What are the two fundamental characteristics of antennas?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
38
____, which runs under the Linux operating system, can report similar information as NetStumbler, such as the SSID.

A) Kismet
B) KisMAC
C) WZC
D) GPSMac
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
39
Briefly describe the main characteristics of a tablet computer.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
40
Briefly describe a wireless packet sniffer.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
41
Briefly describe a packet sniffer.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
42
Match between columns
group of integrated circuits that provide the functionality of the wireless NIC.
Omni-directional antenna
group of integrated circuits that provide the functionality of the wireless NIC.
Phishing
group of integrated circuits that provide the functionality of the wireless NIC.
IPSec
group of integrated circuits that provide the functionality of the wireless NIC.
Chipset
group of integrated circuits that provide the functionality of the wireless NIC.
SNMP management station
group of integrated circuits that provide the functionality of the wireless NIC.
Handheld PC
group of integrated circuits that provide the functionality of the wireless NIC.
Dumpster diving
group of integrated circuits that provide the functionality of the wireless NIC.
Mini PCI
group of integrated circuits that provide the functionality of the wireless NIC.
Wireless Zero Configuration (WZC)
communicates with the software agents on each network device and collects the data stored in the MIBs.
Omni-directional antenna
communicates with the software agents on each network device and collects the data stored in the MIBs.
Phishing
communicates with the software agents on each network device and collects the data stored in the MIBs.
IPSec
communicates with the software agents on each network device and collects the data stored in the MIBs.
Chipset
communicates with the software agents on each network device and collects the data stored in the MIBs.
SNMP management station
communicates with the software agents on each network device and collects the data stored in the MIBs.
Handheld PC
communicates with the software agents on each network device and collects the data stored in the MIBs.
Dumpster diving
communicates with the software agents on each network device and collects the data stored in the MIBs.
Mini PCI
communicates with the software agents on each network device and collects the data stored in the MIBs.
Wireless Zero Configuration (WZC)
detects signals from all directions equally.
Omni-directional antenna
detects signals from all directions equally.
Phishing
detects signals from all directions equally.
IPSec
detects signals from all directions equally.
Chipset
detects signals from all directions equally.
SNMP management station
detects signals from all directions equally.
Handheld PC
detects signals from all directions equally.
Dumpster diving
detects signals from all directions equally.
Mini PCI
detects signals from all directions equally.
Wireless Zero Configuration (WZC)
set of protocols developed to support the secure exchange of packets.
Omni-directional antenna
set of protocols developed to support the secure exchange of packets.
Phishing
set of protocols developed to support the secure exchange of packets.
IPSec
set of protocols developed to support the secure exchange of packets.
Chipset
set of protocols developed to support the secure exchange of packets.
SNMP management station
set of protocols developed to support the secure exchange of packets.
Handheld PC
set of protocols developed to support the secure exchange of packets.
Dumpster diving
set of protocols developed to support the secure exchange of packets.
Mini PCI
set of protocols developed to support the secure exchange of packets.
Wireless Zero Configuration (WZC)
looking through large (usually outdoor) trash receptacles.
Omni-directional antenna
looking through large (usually outdoor) trash receptacles.
Phishing
looking through large (usually outdoor) trash receptacles.
IPSec
looking through large (usually outdoor) trash receptacles.
Chipset
looking through large (usually outdoor) trash receptacles.
SNMP management station
looking through large (usually outdoor) trash receptacles.
Handheld PC
looking through large (usually outdoor) trash receptacles.
Dumpster diving
looking through large (usually outdoor) trash receptacles.
Mini PCI
looking through large (usually outdoor) trash receptacles.
Wireless Zero Configuration (WZC)
designed to provide the familiar applications from a desktop computer in a mobile format.
Omni-directional antenna
designed to provide the familiar applications from a desktop computer in a mobile format.
Phishing
designed to provide the familiar applications from a desktop computer in a mobile format.
IPSec
designed to provide the familiar applications from a desktop computer in a mobile format.
Chipset
designed to provide the familiar applications from a desktop computer in a mobile format.
SNMP management station
designed to provide the familiar applications from a desktop computer in a mobile format.
Handheld PC
designed to provide the familiar applications from a desktop computer in a mobile format.
Dumpster diving
designed to provide the familiar applications from a desktop computer in a mobile format.
Mini PCI
designed to provide the familiar applications from a desktop computer in a mobile format.
Wireless Zero Configuration (WZC)
integrated operating system tool for a Windows-based computer.
Omni-directional antenna
integrated operating system tool for a Windows-based computer.
Phishing
integrated operating system tool for a Windows-based computer.
IPSec
integrated operating system tool for a Windows-based computer.
Chipset
integrated operating system tool for a Windows-based computer.
SNMP management station
integrated operating system tool for a Windows-based computer.
Handheld PC
integrated operating system tool for a Windows-based computer.
Dumpster diving
integrated operating system tool for a Windows-based computer.
Mini PCI
integrated operating system tool for a Windows-based computer.
Wireless Zero Configuration (WZC)
small card that is functionally equivalent to a standard PCI expansion card.
Omni-directional antenna
small card that is functionally equivalent to a standard PCI expansion card.
Phishing
small card that is functionally equivalent to a standard PCI expansion card.
IPSec
small card that is functionally equivalent to a standard PCI expansion card.
Chipset
small card that is functionally equivalent to a standard PCI expansion card.
SNMP management station
small card that is functionally equivalent to a standard PCI expansion card.
Handheld PC
small card that is functionally equivalent to a standard PCI expansion card.
Dumpster diving
small card that is functionally equivalent to a standard PCI expansion card.
Mini PCI
small card that is functionally equivalent to a standard PCI expansion card.
Wireless Zero Configuration (WZC)
an electronic version of social engineering.
Omni-directional antenna
an electronic version of social engineering.
Phishing
an electronic version of social engineering.
IPSec
an electronic version of social engineering.
Chipset
an electronic version of social engineering.
SNMP management station
an electronic version of social engineering.
Handheld PC
an electronic version of social engineering.
Dumpster diving
an electronic version of social engineering.
Mini PCI
an electronic version of social engineering.
Wireless Zero Configuration (WZC)
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.