Deck 10: Managing the Wireless Network

ملء الشاشة (f)
exit full mode
سؤال
All wireless network interface card adapters can act as a wireless device probe.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
Global positioning systems (GPS) are widely used in 802.11 WLANs.
سؤال
A ____ probe is a standard wireless device, such as a portable laptop computer, configured to act as a wireless probe.

A) desktop
B) access point
C) wireless device
D) dedicated
سؤال
Both SNMP and WLAN management systems contain tools to perform three important management functions: network discovery, ____, and configuration.

A) auditing
B) monitoring
C) logging
D) network association
سؤال
A spike in a network's bandwidth or a decrease in the time to respond to a request are signs that the network is running slowly. These events are known as a(n) ____.

A) AP trap
B) CDP trap
C) WLAN trap
D) SNMP trap
سؤال
In a WIPS, signatures, instead of being used for attack detection, are only used to provide additional details about the attack itself.
سؤال
____ is a diagnostic program that sends a packet to a device and waits for a response to determine if it is properly functioning.

A) MIB
B) SSH
C) SFTP
D) PING
سؤال
____ allows computers and network equipment to gather data about network performance.

A) SNMP
B) FTP
C) HTTP
D) L2TP
سؤال
A ____ has been labeled a "cat and mouse" game for trying to find rogue access points.

A) mobile sniffing audit
B) wireless probe
C) triangulation method
D) trilateration method
سؤال
If SNMP is being used, monitoring often focuses upon the performance of the network.
سؤال
____ uses intelligent algorithms to improve precision by accounting for the environmental effects on the wireless signal itself.

A) Triangulation
B) Trilateration
C) RSSI
D) RF fingerprinting
سؤال
The ____ Act covers corporate governance, financial disclosure, and the practice of public accounting.

A) Gramm-Leach-Bliley
B) Health Insurance Portability and Accountability
C) Sarbanes-Oxley
D) CAN-SPAM
سؤال
Monitoring the RF frequency requires a special sensor called a(n) ____.

A) AP fingerprinter
B) wireless probe
C) wireless triangulator
D) AP trilaterator
سؤال
____ can be used to measure the RF power loss between transmitter and receiver to calculate the distance from the transmitting device to the receiver.

A) RF fingerprinting
B) RSSI
C) Trilateration
D) Triangulation
سؤال
The nearest sensor method can locate a client to within a ____ meter area.

A) 600
B) 670
C) 900
D) 930
سؤال
A ____ constantly monitors the radio frequency (using wireless probes) for attacks.

A) wireless intrusion detection system (WIDS)
B) wireless AP detection system (WADS)
C) rogue AP prevention system (RAPS)
D) rogue AP detection system (RADS)
سؤال
A(n) ____ WIDS analyzes the information it gathers and compares it to large databases of attack signatures.

A) baseline detection
B) anomaly detection
C) behavior detection
D) signature detection
سؤال
A(n) ____ integrates several layers of protection to detect and prevent malicious attacks.

A) WLAN concentrator
B) AP concentrator
C) wireless intrusion prevention system (WIPS)
D) RF fingerprinter
سؤال
The ____ is a signal that tells the strength of the incoming (received) signal.

A) RSSI
B) HTTP
C) MIB
D) RFAP
سؤال
Wireless network bandwidth is less than that of a wired network.
سؤال
What is the key to wireless probes?
سؤال
WIPS detect categories of attacks using predictable or ____ techniques that may involve a combination of different approaches.

A) random
B) deterministic
C) unordered
D) unpredictable
سؤال
A(n) ____ probe uses dedicated probes for scanning the RF for attacks.

A) integrated
B) embedded
C) internal
D) overlay
سؤال
In a WIDS anomaly detection system the security administrator defines the ____ (or normal) state of the network's traffic.

A) baseline
B) signature
C) pattern
D) false positives
سؤال
A(n) ____ probe uses existing access points to monitor the RF.

A) superposed
B) overlay
C) integrated
D) external
سؤال
Briefly explain the benefits of using SNMP and WLAN management systems to configure APs.
سؤال
Why was important to monitor a wired network?
سؤال
A(n) ____ system monitors the normal activity of the wireless LAN and "learns" its normal characteristics.

A) signature detection
B) anomaly detection
C) known attacks detection
D) pattern detection
سؤال
What are the advantages and disadvantages of using SNMP for WLANs?
سؤال
How does the nearest sensor method work?
سؤال
A more proactive approach than intrusion detection is a(n) ____.

A) RF fingerprinting
B) trilateration system
C) RSSI system
D) intrusion prevention system (IPS)
سؤال
An SNMP ____________________ acknowledges the message with an SNMP response.
سؤال
Briefly describe how SNMP works.
سؤال
____________________ measures the angles between three or more nearby APs; where the measurements intersect this can be used to calculate the location of the device.
سؤال
The ____________________ governs the privacy of personal health information.
سؤال
A(n) ____________________ is a security management system that compiles information from a computer network or individual computer and then analyzes it to identify security vulnerabilities and attacks.
سؤال
What are the steps to perform a mobile sniffing audit?
سؤال
____________________ measures the distance between three or more APs rather than the angles between them.
سؤال
What is the problem with rogue access points?
سؤال
What are the disadvantages of using a WIDS?
سؤال
Compare an intrusion system with a firewall.
سؤال
Match between columns
most basic method for identifying and locating a rogue access point.
SNMP
most basic method for identifying and locating a rogue access point.
Intrusion prevention system
most basic method for identifying and locating a rogue access point.
Mobile sniffing audit
most basic method for identifying and locating a rogue access point.
Wireless probe
most basic method for identifying and locating a rogue access point.
Dedicated probe
most basic method for identifying and locating a rogue access point.
Gramm-Leach-Bliley Act (GLBA)
most basic method for identifying and locating a rogue access point.
False positives
most basic method for identifying and locating a rogue access point.
Wireless intrusion prevention system (WIPS)
most basic method for identifying and locating a rogue access point.
Nearest sensor
simplest wireless device discovery method.
SNMP
simplest wireless device discovery method.
Intrusion prevention system
simplest wireless device discovery method.
Mobile sniffing audit
simplest wireless device discovery method.
Wireless probe
simplest wireless device discovery method.
Dedicated probe
simplest wireless device discovery method.
Gramm-Leach-Bliley Act (GLBA)
simplest wireless device discovery method.
False positives
simplest wireless device discovery method.
Wireless intrusion prevention system (WIPS)
simplest wireless device discovery method.
Nearest sensor
device that can monitor the airwaves for traffic.
SNMP
device that can monitor the airwaves for traffic.
Intrusion prevention system
device that can monitor the airwaves for traffic.
Mobile sniffing audit
device that can monitor the airwaves for traffic.
Wireless probe
device that can monitor the airwaves for traffic.
Dedicated probe
device that can monitor the airwaves for traffic.
Gramm-Leach-Bliley Act (GLBA)
device that can monitor the airwaves for traffic.
False positives
device that can monitor the airwaves for traffic.
Wireless intrusion prevention system (WIPS)
device that can monitor the airwaves for traffic.
Nearest sensor
attempts to uncover and prevent an attack before it harms the WLAN.
SNMP
attempts to uncover and prevent an attack before it harms the WLAN.
Intrusion prevention system
attempts to uncover and prevent an attack before it harms the WLAN.
Mobile sniffing audit
attempts to uncover and prevent an attack before it harms the WLAN.
Wireless probe
attempts to uncover and prevent an attack before it harms the WLAN.
Dedicated probe
attempts to uncover and prevent an attack before it harms the WLAN.
Gramm-Leach-Bliley Act (GLBA)
attempts to uncover and prevent an attack before it harms the WLAN.
False positives
attempts to uncover and prevent an attack before it harms the WLAN.
Wireless intrusion prevention system (WIPS)
attempts to uncover and prevent an attack before it harms the WLAN.
Nearest sensor
gives limited privacy protections against the sale of private financial information and obtaining personal information through false pretenses.
SNMP
gives limited privacy protections against the sale of private financial information and obtaining personal information through false pretenses.
Intrusion prevention system
gives limited privacy protections against the sale of private financial information and obtaining personal information through false pretenses.
Mobile sniffing audit
gives limited privacy protections against the sale of private financial information and obtaining personal information through false pretenses.
Wireless probe
gives limited privacy protections against the sale of private financial information and obtaining personal information through false pretenses.
Dedicated probe
gives limited privacy protections against the sale of private financial information and obtaining personal information through false pretenses.
Gramm-Leach-Bliley Act (GLBA)
gives limited privacy protections against the sale of private financial information and obtaining personal information through false pretenses.
False positives
gives limited privacy protections against the sale of private financial information and obtaining personal information through false pretenses.
Wireless intrusion prevention system (WIPS)
gives limited privacy protections against the sale of private financial information and obtaining personal information through false pretenses.
Nearest sensor
standard network management protocol for wired networks.
SNMP
standard network management protocol for wired networks.
Intrusion prevention system
standard network management protocol for wired networks.
Mobile sniffing audit
standard network management protocol for wired networks.
Wireless probe
standard network management protocol for wired networks.
Dedicated probe
standard network management protocol for wired networks.
Gramm-Leach-Bliley Act (GLBA)
standard network management protocol for wired networks.
False positives
standard network management protocol for wired networks.
Wireless intrusion prevention system (WIPS)
standard network management protocol for wired networks.
Nearest sensor
designed to exclusively monitor the RF frequency for transmissions.
SNMP
designed to exclusively monitor the RF frequency for transmissions.
Intrusion prevention system
designed to exclusively monitor the RF frequency for transmissions.
Mobile sniffing audit
designed to exclusively monitor the RF frequency for transmissions.
Wireless probe
designed to exclusively monitor the RF frequency for transmissions.
Dedicated probe
designed to exclusively monitor the RF frequency for transmissions.
Gramm-Leach-Bliley Act (GLBA)
designed to exclusively monitor the RF frequency for transmissions.
False positives
designed to exclusively monitor the RF frequency for transmissions.
Wireless intrusion prevention system (WIPS)
designed to exclusively monitor the RF frequency for transmissions.
Nearest sensor
designed to stop an attack from occurring.
SNMP
designed to stop an attack from occurring.
Intrusion prevention system
designed to stop an attack from occurring.
Mobile sniffing audit
designed to stop an attack from occurring.
Wireless probe
designed to stop an attack from occurring.
Dedicated probe
designed to stop an attack from occurring.
Gramm-Leach-Bliley Act (GLBA)
designed to stop an attack from occurring.
False positives
designed to stop an attack from occurring.
Wireless intrusion prevention system (WIPS)
designed to stop an attack from occurring.
Nearest sensor
false attack alerts.
SNMP
false attack alerts.
Intrusion prevention system
false attack alerts.
Mobile sniffing audit
false attack alerts.
Wireless probe
false attack alerts.
Dedicated probe
false attack alerts.
Gramm-Leach-Bliley Act (GLBA)
false attack alerts.
False positives
false attack alerts.
Wireless intrusion prevention system (WIPS)
false attack alerts.
Nearest sensor
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/42
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 10: Managing the Wireless Network
1
All wireless network interface card adapters can act as a wireless device probe.
False
2
Global positioning systems (GPS) are widely used in 802.11 WLANs.
False
3
A ____ probe is a standard wireless device, such as a portable laptop computer, configured to act as a wireless probe.

A) desktop
B) access point
C) wireless device
D) dedicated
C
4
Both SNMP and WLAN management systems contain tools to perform three important management functions: network discovery, ____, and configuration.

A) auditing
B) monitoring
C) logging
D) network association
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
5
A spike in a network's bandwidth or a decrease in the time to respond to a request are signs that the network is running slowly. These events are known as a(n) ____.

A) AP trap
B) CDP trap
C) WLAN trap
D) SNMP trap
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
6
In a WIPS, signatures, instead of being used for attack detection, are only used to provide additional details about the attack itself.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
7
____ is a diagnostic program that sends a packet to a device and waits for a response to determine if it is properly functioning.

A) MIB
B) SSH
C) SFTP
D) PING
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
8
____ allows computers and network equipment to gather data about network performance.

A) SNMP
B) FTP
C) HTTP
D) L2TP
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
9
A ____ has been labeled a "cat and mouse" game for trying to find rogue access points.

A) mobile sniffing audit
B) wireless probe
C) triangulation method
D) trilateration method
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
10
If SNMP is being used, monitoring often focuses upon the performance of the network.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
11
____ uses intelligent algorithms to improve precision by accounting for the environmental effects on the wireless signal itself.

A) Triangulation
B) Trilateration
C) RSSI
D) RF fingerprinting
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
12
The ____ Act covers corporate governance, financial disclosure, and the practice of public accounting.

A) Gramm-Leach-Bliley
B) Health Insurance Portability and Accountability
C) Sarbanes-Oxley
D) CAN-SPAM
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
13
Monitoring the RF frequency requires a special sensor called a(n) ____.

A) AP fingerprinter
B) wireless probe
C) wireless triangulator
D) AP trilaterator
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
14
____ can be used to measure the RF power loss between transmitter and receiver to calculate the distance from the transmitting device to the receiver.

A) RF fingerprinting
B) RSSI
C) Trilateration
D) Triangulation
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
15
The nearest sensor method can locate a client to within a ____ meter area.

A) 600
B) 670
C) 900
D) 930
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
16
A ____ constantly monitors the radio frequency (using wireless probes) for attacks.

A) wireless intrusion detection system (WIDS)
B) wireless AP detection system (WADS)
C) rogue AP prevention system (RAPS)
D) rogue AP detection system (RADS)
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
17
A(n) ____ WIDS analyzes the information it gathers and compares it to large databases of attack signatures.

A) baseline detection
B) anomaly detection
C) behavior detection
D) signature detection
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
18
A(n) ____ integrates several layers of protection to detect and prevent malicious attacks.

A) WLAN concentrator
B) AP concentrator
C) wireless intrusion prevention system (WIPS)
D) RF fingerprinter
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
19
The ____ is a signal that tells the strength of the incoming (received) signal.

A) RSSI
B) HTTP
C) MIB
D) RFAP
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
20
Wireless network bandwidth is less than that of a wired network.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
21
What is the key to wireless probes?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
22
WIPS detect categories of attacks using predictable or ____ techniques that may involve a combination of different approaches.

A) random
B) deterministic
C) unordered
D) unpredictable
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
23
A(n) ____ probe uses dedicated probes for scanning the RF for attacks.

A) integrated
B) embedded
C) internal
D) overlay
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
24
In a WIDS anomaly detection system the security administrator defines the ____ (or normal) state of the network's traffic.

A) baseline
B) signature
C) pattern
D) false positives
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
25
A(n) ____ probe uses existing access points to monitor the RF.

A) superposed
B) overlay
C) integrated
D) external
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
26
Briefly explain the benefits of using SNMP and WLAN management systems to configure APs.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
27
Why was important to monitor a wired network?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
28
A(n) ____ system monitors the normal activity of the wireless LAN and "learns" its normal characteristics.

A) signature detection
B) anomaly detection
C) known attacks detection
D) pattern detection
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
29
What are the advantages and disadvantages of using SNMP for WLANs?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
30
How does the nearest sensor method work?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
31
A more proactive approach than intrusion detection is a(n) ____.

A) RF fingerprinting
B) trilateration system
C) RSSI system
D) intrusion prevention system (IPS)
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
32
An SNMP ____________________ acknowledges the message with an SNMP response.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
33
Briefly describe how SNMP works.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
34
____________________ measures the angles between three or more nearby APs; where the measurements intersect this can be used to calculate the location of the device.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
35
The ____________________ governs the privacy of personal health information.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
36
A(n) ____________________ is a security management system that compiles information from a computer network or individual computer and then analyzes it to identify security vulnerabilities and attacks.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
37
What are the steps to perform a mobile sniffing audit?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
38
____________________ measures the distance between three or more APs rather than the angles between them.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
39
What is the problem with rogue access points?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
40
What are the disadvantages of using a WIDS?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
41
Compare an intrusion system with a firewall.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
42
Match between columns
most basic method for identifying and locating a rogue access point.
SNMP
most basic method for identifying and locating a rogue access point.
Intrusion prevention system
most basic method for identifying and locating a rogue access point.
Mobile sniffing audit
most basic method for identifying and locating a rogue access point.
Wireless probe
most basic method for identifying and locating a rogue access point.
Dedicated probe
most basic method for identifying and locating a rogue access point.
Gramm-Leach-Bliley Act (GLBA)
most basic method for identifying and locating a rogue access point.
False positives
most basic method for identifying and locating a rogue access point.
Wireless intrusion prevention system (WIPS)
most basic method for identifying and locating a rogue access point.
Nearest sensor
simplest wireless device discovery method.
SNMP
simplest wireless device discovery method.
Intrusion prevention system
simplest wireless device discovery method.
Mobile sniffing audit
simplest wireless device discovery method.
Wireless probe
simplest wireless device discovery method.
Dedicated probe
simplest wireless device discovery method.
Gramm-Leach-Bliley Act (GLBA)
simplest wireless device discovery method.
False positives
simplest wireless device discovery method.
Wireless intrusion prevention system (WIPS)
simplest wireless device discovery method.
Nearest sensor
device that can monitor the airwaves for traffic.
SNMP
device that can monitor the airwaves for traffic.
Intrusion prevention system
device that can monitor the airwaves for traffic.
Mobile sniffing audit
device that can monitor the airwaves for traffic.
Wireless probe
device that can monitor the airwaves for traffic.
Dedicated probe
device that can monitor the airwaves for traffic.
Gramm-Leach-Bliley Act (GLBA)
device that can monitor the airwaves for traffic.
False positives
device that can monitor the airwaves for traffic.
Wireless intrusion prevention system (WIPS)
device that can monitor the airwaves for traffic.
Nearest sensor
attempts to uncover and prevent an attack before it harms the WLAN.
SNMP
attempts to uncover and prevent an attack before it harms the WLAN.
Intrusion prevention system
attempts to uncover and prevent an attack before it harms the WLAN.
Mobile sniffing audit
attempts to uncover and prevent an attack before it harms the WLAN.
Wireless probe
attempts to uncover and prevent an attack before it harms the WLAN.
Dedicated probe
attempts to uncover and prevent an attack before it harms the WLAN.
Gramm-Leach-Bliley Act (GLBA)
attempts to uncover and prevent an attack before it harms the WLAN.
False positives
attempts to uncover and prevent an attack before it harms the WLAN.
Wireless intrusion prevention system (WIPS)
attempts to uncover and prevent an attack before it harms the WLAN.
Nearest sensor
gives limited privacy protections against the sale of private financial information and obtaining personal information through false pretenses.
SNMP
gives limited privacy protections against the sale of private financial information and obtaining personal information through false pretenses.
Intrusion prevention system
gives limited privacy protections against the sale of private financial information and obtaining personal information through false pretenses.
Mobile sniffing audit
gives limited privacy protections against the sale of private financial information and obtaining personal information through false pretenses.
Wireless probe
gives limited privacy protections against the sale of private financial information and obtaining personal information through false pretenses.
Dedicated probe
gives limited privacy protections against the sale of private financial information and obtaining personal information through false pretenses.
Gramm-Leach-Bliley Act (GLBA)
gives limited privacy protections against the sale of private financial information and obtaining personal information through false pretenses.
False positives
gives limited privacy protections against the sale of private financial information and obtaining personal information through false pretenses.
Wireless intrusion prevention system (WIPS)
gives limited privacy protections against the sale of private financial information and obtaining personal information through false pretenses.
Nearest sensor
standard network management protocol for wired networks.
SNMP
standard network management protocol for wired networks.
Intrusion prevention system
standard network management protocol for wired networks.
Mobile sniffing audit
standard network management protocol for wired networks.
Wireless probe
standard network management protocol for wired networks.
Dedicated probe
standard network management protocol for wired networks.
Gramm-Leach-Bliley Act (GLBA)
standard network management protocol for wired networks.
False positives
standard network management protocol for wired networks.
Wireless intrusion prevention system (WIPS)
standard network management protocol for wired networks.
Nearest sensor
designed to exclusively monitor the RF frequency for transmissions.
SNMP
designed to exclusively monitor the RF frequency for transmissions.
Intrusion prevention system
designed to exclusively monitor the RF frequency for transmissions.
Mobile sniffing audit
designed to exclusively monitor the RF frequency for transmissions.
Wireless probe
designed to exclusively monitor the RF frequency for transmissions.
Dedicated probe
designed to exclusively monitor the RF frequency for transmissions.
Gramm-Leach-Bliley Act (GLBA)
designed to exclusively monitor the RF frequency for transmissions.
False positives
designed to exclusively monitor the RF frequency for transmissions.
Wireless intrusion prevention system (WIPS)
designed to exclusively monitor the RF frequency for transmissions.
Nearest sensor
designed to stop an attack from occurring.
SNMP
designed to stop an attack from occurring.
Intrusion prevention system
designed to stop an attack from occurring.
Mobile sniffing audit
designed to stop an attack from occurring.
Wireless probe
designed to stop an attack from occurring.
Dedicated probe
designed to stop an attack from occurring.
Gramm-Leach-Bliley Act (GLBA)
designed to stop an attack from occurring.
False positives
designed to stop an attack from occurring.
Wireless intrusion prevention system (WIPS)
designed to stop an attack from occurring.
Nearest sensor
false attack alerts.
SNMP
false attack alerts.
Intrusion prevention system
false attack alerts.
Mobile sniffing audit
false attack alerts.
Wireless probe
false attack alerts.
Dedicated probe
false attack alerts.
Gramm-Leach-Bliley Act (GLBA)
false attack alerts.
False positives
false attack alerts.
Wireless intrusion prevention system (WIPS)
false attack alerts.
Nearest sensor
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.