Deck 12: Operational Support and Wireless Convergence

ملء الشاشة (f)
exit full mode
سؤال
The ____ refers to the connection that begins at a fast ISP, goes through the local neighborhood, and ends at the home or office.

A) last mile connection
B) fiber-optic mile
C) copper line
D) cable connection
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
WPA replaces WEP with an encryption technology called ____.

A) Secure Shell (SSH)
B) Temporal Key Integrity Protocol (TKIP)
C) Message Integrity Check (MIC)
D) Message Authentication Code (MAC)
سؤال
WiMAX is based on the IEEE ____ standard approved in June 2004.

A) 802.3
B) 802.16
C) 802.32
D) 802.56
سؤال
____, or controlling changes made to the WLAN after installation, is another key element of operational support.

A) Controlling and Evaluation
B) Configuration management
C) Monitoring
D) Education
سؤال
WPA2 is based on the final IEEE 802.11F standard ratified in June 2004.
سؤال
In a wireless LAN access control is often performed by enterprise ____.

A) wireless gateways
B) wireless probes
C) router probes
D) AP gateways
سؤال
A(n) ____ is designed to stop an attack from occurring by uncovering and preventing an attack before it harms the WLAN.

A) WIDS
B) IDS
C) WLAN management system
D) WIPS
سؤال
Monitoring tools for wired networks always provide the full array of features necessary for monitoring WLANs.
سؤال
____ allows computers and network equipment to gather data about network performance.

A) FTP
B) SNMP
C) SFTP
D) L2TP
سؤال
All networks require effective operational support to ensure that everything functions as intended.
سؤال
A ____ constantly monitors the radio frequency for attacks.

A) WIDS
B) SNMP
C) WLAN management system
D) SFTP system
سؤال
A secure WLAN should use WEP for its encryption, although WPA may be required in older legacy equipment.
سؤال
____ allows users to freely roam both indoors and outdoors for kilometers while remaining connected.

A) Fixed WiMAX
B) 3G
C) Mobile WiMAX
D) DSL WiMAX
سؤال
Most people are taught using a(n) ____ approach, which comes from a Greek word meaning to lead a child.

A) pedagogical
B) neurological
C) visual
D) kinesthetic
سؤال
All computer users share responsibility for protecting the assets of an organization.
سؤال
An important principle of good wireless network security design is dividing the network into smaller units, a practice known as ____.

A) VPN
B) filtering
C) segmentation
D) firewalling
سؤال
In order for a change request form process to be able to thoroughly evaluate how a proposed change may impact the WLAN, it is first necessary to have established a(n) ____.

A) RF channel
B) coverage area
C) WLAN baseline
D) AP area
سؤال
At the heart of any secure WLAN is ____.

A) traffic filtering
B) protocol monitoring
C) education and training
D) strong encryption
سؤال
IEEE ____ allows a wireless client to determine the quality of service (QoS) and security being used at a different AP before making the transition.

A) 802.11a
B) 802.11g
C) 802.11i
D) 802.11r
سؤال
A WLAN that has been designed from the outset to be secure and ____ (able to accommodate growth) will provide a solid foundation from which attacks can be thwarted and users can feel confident regarding the security of their work.

A) mobile
B) fast
C) scalable
D) global
سؤال
A baseline will typically include a(n) ____________________, or a listing of all installed wireless components,configuration settings,and diagrams that document the current state of the wireless LAN.
سؤال
The first generation of wireless cellular technology is known as ____.

A) 0G
B) 1G
C) 2.5G
D) 3G
سؤال
What elements can be identified using WLAN monitoring tools?
سؤال
Why is operational support important for a WLAN?
سؤال
A(n) ____________________ outlines the requested alteration in such a way that it can be determine what type of review is needed prior to accepting (or rejecting) the proposed changes.
سؤال
How can wireless segmentation be accomplished?
سؤال
How does WPA Enterprise and WPA2 Enterprise models port-based authentication work?
سؤال
Briefly describe traffic filtering.
سؤال
Briefly describe role-based access control.
سؤال
With throughput rates for ____ averaging between 400 Kbps and 700 Kbps, this means for the first time the cellular telephone network can be used for wireless data communications.

A) 1G
B) 2G
C) 2.5G
D) 3G
سؤال
The ____ is an interim step between 2G and 3G digital cellular networks.

A) 2.1G
B) 2i.G
C) 2.5G
D)2.Ig
سؤال
What are the types of changes that can be made to an WLAN?
سؤال
Known as ____________________, it is the mechanism for limiting access to resources based on the users' identity and their membership in various groups.
سؤال
Encryption under theWPA2 personal security model is accomplished by using the block cipher ____________________.
سؤال
The first generation of wireless cellular telephony transmitted at 9.6 Kbps using analog ____ technology.

A) packet-switch
B) frame-switch
C) unit-switch
D) circuit-switch
سؤال
The current 802.16 standard, known as ____________________, is officially IEEE 802.16-2004.
سؤال
How does RADIUS work?
سؤال
The primary difference between 2G and 2.5G networks is that 2.5G networks are ____.

A) circuit-switched
B) packet-switched
C) channel-switched
D) path-switched
سؤال
The IEEE ____ standard would permit users to roam up to 15 kilometers and to deliver those high-speed rates to mobile users even when they are traveling at speeds up to 250 kilometers per hour (155 miles per hour).

A) 802.3
B) 802.16
C) 802.17i
D) 802.20
سؤال
Why is it important to train and educate all network users?
سؤال
What are the characteristics of 3G technology for data communications?
سؤال
Match between columns
specifies information that access points need to exchange to support WLAN roaming.
IEEE 802.11F
specifies information that access points need to exchange to support WLAN roaming.
Wired equivalent privacy (WEP)
specifies information that access points need to exchange to support WLAN roaming.
Mobile WiMAX
specifies information that access points need to exchange to support WLAN roaming.
Traffic filtering
specifies information that access points need to exchange to support WLAN roaming.
WLAN management system
specifies information that access points need to exchange to support WLAN roaming.
Wireless authentication
specifies information that access points need to exchange to support WLAN roaming.
SNMP
specifies information that access points need to exchange to support WLAN roaming.
Network segment
specifies information that access points need to exchange to support WLAN roaming.
2G cellular telephony
verifies that the person requesting access to the network is who they claim to be.
IEEE 802.11F
verifies that the person requesting access to the network is who they claim to be.
Wired equivalent privacy (WEP)
verifies that the person requesting access to the network is who they claim to be.
Mobile WiMAX
verifies that the person requesting access to the network is who they claim to be.
Traffic filtering
verifies that the person requesting access to the network is who they claim to be.
WLAN management system
verifies that the person requesting access to the network is who they claim to be.
Wireless authentication
verifies that the person requesting access to the network is who they claim to be.
SNMP
verifies that the person requesting access to the network is who they claim to be.
Network segment
verifies that the person requesting access to the network is who they claim to be.
2G cellular telephony
subset of a larger network.
IEEE 802.11F
subset of a larger network.
Wired equivalent privacy (WEP)
subset of a larger network.
Mobile WiMAX
subset of a larger network.
Traffic filtering
subset of a larger network.
WLAN management system
subset of a larger network.
Wireless authentication
subset of a larger network.
SNMP
subset of a larger network.
Network segment
subset of a larger network.
2G cellular telephony
adds mobility components to the Fixed WiMAX standard.
IEEE 802.11F
adds mobility components to the Fixed WiMAX standard.
Wired equivalent privacy (WEP)
adds mobility components to the Fixed WiMAX standard.
Mobile WiMAX
adds mobility components to the Fixed WiMAX standard.
Traffic filtering
adds mobility components to the Fixed WiMAX standard.
WLAN management system
adds mobility components to the Fixed WiMAX standard.
Wireless authentication
adds mobility components to the Fixed WiMAX standard.
SNMP
adds mobility components to the Fixed WiMAX standard.
Network segment
adds mobility components to the Fixed WiMAX standard.
2G cellular telephony
original IEEE 802.11 encryption mechanism.
IEEE 802.11F
original IEEE 802.11 encryption mechanism.
Wired equivalent privacy (WEP)
original IEEE 802.11 encryption mechanism.
Mobile WiMAX
original IEEE 802.11 encryption mechanism.
Traffic filtering
original IEEE 802.11 encryption mechanism.
WLAN management system
original IEEE 802.11 encryption mechanism.
Wireless authentication
original IEEE 802.11 encryption mechanism.
SNMP
original IEEE 802.11 encryption mechanism.
Network segment
original IEEE 802.11 encryption mechanism.
2G cellular telephony
used circuit-switched digital networks and started in the early 1990s.
IEEE 802.11F
used circuit-switched digital networks and started in the early 1990s.
Wired equivalent privacy (WEP)
used circuit-switched digital networks and started in the early 1990s.
Mobile WiMAX
used circuit-switched digital networks and started in the early 1990s.
Traffic filtering
used circuit-switched digital networks and started in the early 1990s.
WLAN management system
used circuit-switched digital networks and started in the early 1990s.
Wireless authentication
used circuit-switched digital networks and started in the early 1990s.
SNMP
used circuit-switched digital networks and started in the early 1990s.
Network segment
used circuit-switched digital networks and started in the early 1990s.
2G cellular telephony
standard network management protocol for both wired and wireless networks.
IEEE 802.11F
standard network management protocol for both wired and wireless networks.
Wired equivalent privacy (WEP)
standard network management protocol for both wired and wireless networks.
Mobile WiMAX
standard network management protocol for both wired and wireless networks.
Traffic filtering
standard network management protocol for both wired and wireless networks.
WLAN management system
standard network management protocol for both wired and wireless networks.
Wireless authentication
standard network management protocol for both wired and wireless networks.
SNMP
standard network management protocol for both wired and wireless networks.
Network segment
standard network management protocol for both wired and wireless networks.
2G cellular telephony
restricts the traffic on a network based on specific criteria.
IEEE 802.11F
restricts the traffic on a network based on specific criteria.
Wired equivalent privacy (WEP)
restricts the traffic on a network based on specific criteria.
Mobile WiMAX
restricts the traffic on a network based on specific criteria.
Traffic filtering
restricts the traffic on a network based on specific criteria.
WLAN management system
restricts the traffic on a network based on specific criteria.
Wireless authentication
restricts the traffic on a network based on specific criteria.
SNMP
restricts the traffic on a network based on specific criteria.
Network segment
restricts the traffic on a network based on specific criteria.
2G cellular telephony
uses discovery tools to continuously monitor the RF for attacks
IEEE 802.11F
uses discovery tools to continuously monitor the RF for attacks
Wired equivalent privacy (WEP)
uses discovery tools to continuously monitor the RF for attacks
Mobile WiMAX
uses discovery tools to continuously monitor the RF for attacks
Traffic filtering
uses discovery tools to continuously monitor the RF for attacks
WLAN management system
uses discovery tools to continuously monitor the RF for attacks
Wireless authentication
uses discovery tools to continuously monitor the RF for attacks
SNMP
uses discovery tools to continuously monitor the RF for attacks
Network segment
uses discovery tools to continuously monitor the RF for attacks
2G cellular telephony
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/42
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 12: Operational Support and Wireless Convergence
1
The ____ refers to the connection that begins at a fast ISP, goes through the local neighborhood, and ends at the home or office.

A) last mile connection
B) fiber-optic mile
C) copper line
D) cable connection
A
2
WPA replaces WEP with an encryption technology called ____.

A) Secure Shell (SSH)
B) Temporal Key Integrity Protocol (TKIP)
C) Message Integrity Check (MIC)
D) Message Authentication Code (MAC)
B
3
WiMAX is based on the IEEE ____ standard approved in June 2004.

A) 802.3
B) 802.16
C) 802.32
D) 802.56
B
4
____, or controlling changes made to the WLAN after installation, is another key element of operational support.

A) Controlling and Evaluation
B) Configuration management
C) Monitoring
D) Education
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
5
WPA2 is based on the final IEEE 802.11F standard ratified in June 2004.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
6
In a wireless LAN access control is often performed by enterprise ____.

A) wireless gateways
B) wireless probes
C) router probes
D) AP gateways
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
7
A(n) ____ is designed to stop an attack from occurring by uncovering and preventing an attack before it harms the WLAN.

A) WIDS
B) IDS
C) WLAN management system
D) WIPS
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
8
Monitoring tools for wired networks always provide the full array of features necessary for monitoring WLANs.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
9
____ allows computers and network equipment to gather data about network performance.

A) FTP
B) SNMP
C) SFTP
D) L2TP
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
10
All networks require effective operational support to ensure that everything functions as intended.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
11
A ____ constantly monitors the radio frequency for attacks.

A) WIDS
B) SNMP
C) WLAN management system
D) SFTP system
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
12
A secure WLAN should use WEP for its encryption, although WPA may be required in older legacy equipment.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
13
____ allows users to freely roam both indoors and outdoors for kilometers while remaining connected.

A) Fixed WiMAX
B) 3G
C) Mobile WiMAX
D) DSL WiMAX
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
14
Most people are taught using a(n) ____ approach, which comes from a Greek word meaning to lead a child.

A) pedagogical
B) neurological
C) visual
D) kinesthetic
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
15
All computer users share responsibility for protecting the assets of an organization.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
16
An important principle of good wireless network security design is dividing the network into smaller units, a practice known as ____.

A) VPN
B) filtering
C) segmentation
D) firewalling
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
17
In order for a change request form process to be able to thoroughly evaluate how a proposed change may impact the WLAN, it is first necessary to have established a(n) ____.

A) RF channel
B) coverage area
C) WLAN baseline
D) AP area
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
18
At the heart of any secure WLAN is ____.

A) traffic filtering
B) protocol monitoring
C) education and training
D) strong encryption
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
19
IEEE ____ allows a wireless client to determine the quality of service (QoS) and security being used at a different AP before making the transition.

A) 802.11a
B) 802.11g
C) 802.11i
D) 802.11r
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
20
A WLAN that has been designed from the outset to be secure and ____ (able to accommodate growth) will provide a solid foundation from which attacks can be thwarted and users can feel confident regarding the security of their work.

A) mobile
B) fast
C) scalable
D) global
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
21
A baseline will typically include a(n) ____________________, or a listing of all installed wireless components,configuration settings,and diagrams that document the current state of the wireless LAN.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
22
The first generation of wireless cellular technology is known as ____.

A) 0G
B) 1G
C) 2.5G
D) 3G
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
23
What elements can be identified using WLAN monitoring tools?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
24
Why is operational support important for a WLAN?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
25
A(n) ____________________ outlines the requested alteration in such a way that it can be determine what type of review is needed prior to accepting (or rejecting) the proposed changes.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
26
How can wireless segmentation be accomplished?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
27
How does WPA Enterprise and WPA2 Enterprise models port-based authentication work?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
28
Briefly describe traffic filtering.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
29
Briefly describe role-based access control.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
30
With throughput rates for ____ averaging between 400 Kbps and 700 Kbps, this means for the first time the cellular telephone network can be used for wireless data communications.

A) 1G
B) 2G
C) 2.5G
D) 3G
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
31
The ____ is an interim step between 2G and 3G digital cellular networks.

A) 2.1G
B) 2i.G
C) 2.5G
D)2.Ig
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
32
What are the types of changes that can be made to an WLAN?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
33
Known as ____________________, it is the mechanism for limiting access to resources based on the users' identity and their membership in various groups.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
34
Encryption under theWPA2 personal security model is accomplished by using the block cipher ____________________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
35
The first generation of wireless cellular telephony transmitted at 9.6 Kbps using analog ____ technology.

A) packet-switch
B) frame-switch
C) unit-switch
D) circuit-switch
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
36
The current 802.16 standard, known as ____________________, is officially IEEE 802.16-2004.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
37
How does RADIUS work?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
38
The primary difference between 2G and 2.5G networks is that 2.5G networks are ____.

A) circuit-switched
B) packet-switched
C) channel-switched
D) path-switched
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
39
The IEEE ____ standard would permit users to roam up to 15 kilometers and to deliver those high-speed rates to mobile users even when they are traveling at speeds up to 250 kilometers per hour (155 miles per hour).

A) 802.3
B) 802.16
C) 802.17i
D) 802.20
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
40
Why is it important to train and educate all network users?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
41
What are the characteristics of 3G technology for data communications?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
42
Match between columns
specifies information that access points need to exchange to support WLAN roaming.
IEEE 802.11F
specifies information that access points need to exchange to support WLAN roaming.
Wired equivalent privacy (WEP)
specifies information that access points need to exchange to support WLAN roaming.
Mobile WiMAX
specifies information that access points need to exchange to support WLAN roaming.
Traffic filtering
specifies information that access points need to exchange to support WLAN roaming.
WLAN management system
specifies information that access points need to exchange to support WLAN roaming.
Wireless authentication
specifies information that access points need to exchange to support WLAN roaming.
SNMP
specifies information that access points need to exchange to support WLAN roaming.
Network segment
specifies information that access points need to exchange to support WLAN roaming.
2G cellular telephony
verifies that the person requesting access to the network is who they claim to be.
IEEE 802.11F
verifies that the person requesting access to the network is who they claim to be.
Wired equivalent privacy (WEP)
verifies that the person requesting access to the network is who they claim to be.
Mobile WiMAX
verifies that the person requesting access to the network is who they claim to be.
Traffic filtering
verifies that the person requesting access to the network is who they claim to be.
WLAN management system
verifies that the person requesting access to the network is who they claim to be.
Wireless authentication
verifies that the person requesting access to the network is who they claim to be.
SNMP
verifies that the person requesting access to the network is who they claim to be.
Network segment
verifies that the person requesting access to the network is who they claim to be.
2G cellular telephony
subset of a larger network.
IEEE 802.11F
subset of a larger network.
Wired equivalent privacy (WEP)
subset of a larger network.
Mobile WiMAX
subset of a larger network.
Traffic filtering
subset of a larger network.
WLAN management system
subset of a larger network.
Wireless authentication
subset of a larger network.
SNMP
subset of a larger network.
Network segment
subset of a larger network.
2G cellular telephony
adds mobility components to the Fixed WiMAX standard.
IEEE 802.11F
adds mobility components to the Fixed WiMAX standard.
Wired equivalent privacy (WEP)
adds mobility components to the Fixed WiMAX standard.
Mobile WiMAX
adds mobility components to the Fixed WiMAX standard.
Traffic filtering
adds mobility components to the Fixed WiMAX standard.
WLAN management system
adds mobility components to the Fixed WiMAX standard.
Wireless authentication
adds mobility components to the Fixed WiMAX standard.
SNMP
adds mobility components to the Fixed WiMAX standard.
Network segment
adds mobility components to the Fixed WiMAX standard.
2G cellular telephony
original IEEE 802.11 encryption mechanism.
IEEE 802.11F
original IEEE 802.11 encryption mechanism.
Wired equivalent privacy (WEP)
original IEEE 802.11 encryption mechanism.
Mobile WiMAX
original IEEE 802.11 encryption mechanism.
Traffic filtering
original IEEE 802.11 encryption mechanism.
WLAN management system
original IEEE 802.11 encryption mechanism.
Wireless authentication
original IEEE 802.11 encryption mechanism.
SNMP
original IEEE 802.11 encryption mechanism.
Network segment
original IEEE 802.11 encryption mechanism.
2G cellular telephony
used circuit-switched digital networks and started in the early 1990s.
IEEE 802.11F
used circuit-switched digital networks and started in the early 1990s.
Wired equivalent privacy (WEP)
used circuit-switched digital networks and started in the early 1990s.
Mobile WiMAX
used circuit-switched digital networks and started in the early 1990s.
Traffic filtering
used circuit-switched digital networks and started in the early 1990s.
WLAN management system
used circuit-switched digital networks and started in the early 1990s.
Wireless authentication
used circuit-switched digital networks and started in the early 1990s.
SNMP
used circuit-switched digital networks and started in the early 1990s.
Network segment
used circuit-switched digital networks and started in the early 1990s.
2G cellular telephony
standard network management protocol for both wired and wireless networks.
IEEE 802.11F
standard network management protocol for both wired and wireless networks.
Wired equivalent privacy (WEP)
standard network management protocol for both wired and wireless networks.
Mobile WiMAX
standard network management protocol for both wired and wireless networks.
Traffic filtering
standard network management protocol for both wired and wireless networks.
WLAN management system
standard network management protocol for both wired and wireless networks.
Wireless authentication
standard network management protocol for both wired and wireless networks.
SNMP
standard network management protocol for both wired and wireless networks.
Network segment
standard network management protocol for both wired and wireless networks.
2G cellular telephony
restricts the traffic on a network based on specific criteria.
IEEE 802.11F
restricts the traffic on a network based on specific criteria.
Wired equivalent privacy (WEP)
restricts the traffic on a network based on specific criteria.
Mobile WiMAX
restricts the traffic on a network based on specific criteria.
Traffic filtering
restricts the traffic on a network based on specific criteria.
WLAN management system
restricts the traffic on a network based on specific criteria.
Wireless authentication
restricts the traffic on a network based on specific criteria.
SNMP
restricts the traffic on a network based on specific criteria.
Network segment
restricts the traffic on a network based on specific criteria.
2G cellular telephony
uses discovery tools to continuously monitor the RF for attacks
IEEE 802.11F
uses discovery tools to continuously monitor the RF for attacks
Wired equivalent privacy (WEP)
uses discovery tools to continuously monitor the RF for attacks
Mobile WiMAX
uses discovery tools to continuously monitor the RF for attacks
Traffic filtering
uses discovery tools to continuously monitor the RF for attacks
WLAN management system
uses discovery tools to continuously monitor the RF for attacks
Wireless authentication
uses discovery tools to continuously monitor the RF for attacks
SNMP
uses discovery tools to continuously monitor the RF for attacks
Network segment
uses discovery tools to continuously monitor the RF for attacks
2G cellular telephony
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.