Deck 1: Foundations of Wireless Security

ملء الشاشة (f)
exit full mode
سؤال
IEEE ____ standards set specifications for Ethernet local area network technology.

A) 802.3
B) 802.5
C) 802.11
D) 802.20
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
Individuals who actively search for wireless signals to pick up, often by simply driving down the street, are participating in an activity known as ____.

A) AP war
B) wireless war
C) access driving
D) wardriving
سؤال
____ is a general term used to describe worms, viruses, spyware, or other types of software with a malicious intent.

A) Wireless packet sniffer
B) VoWLAN
C) VoIP
D) Malware
سؤال
Just as a WLAN gives users mobility for accessing data, ____ provides that same freedom for voice communication.

A) 802.11n
B) WiMAX
C) VoWLAN
D) 802.11i
سؤال
A ____ network can determine the optimum route for a packet to travel across the WLAN based on the quality required.

A) flat
B) mesh
C) single
D) linked
سؤال
A ____ site provides office space but the customer must provide and install all the equipment needed to continue operations.

A) cold
B) hot
C) warm
D) red
سؤال
The primary advantage of wireless technology is ____.

A) easier and less expensive installation
B) mobility
C) security
D) disaster recovery
سؤال
The FDA serves as the primary regulatory agency for wireless communications in the United States and its territorial possessions.
سؤال
Along with the many advantages of WLAN technology there are disadvantages and concerns. These include radio frequency interference, health risks, and ____.

A) mobility
B) network reliability
C) installation costs
D) security
سؤال
____ is software (or sometimes hardware) that allows to view the contents of wireless packets.

A) Spyware
B) Malware
C) Wireless packet sniffer
D) Adware
سؤال
Educational institutions were some of the first adopters of WLANs because of their dramatic advantages in teaching and learning.
سؤال
In the early 1980s, the IEEE began work on developing computer network architecture standards. Its work was called ____.

A) WLAN
B) Wi-Fi
C) Project 802
D) WiMAX
سؤال
The ____ establishes standards for telecommunications.

A) FDA
B) IEEE
C) PDA
D) VoIP
سؤال
An employee who purchases a wireless access point and brings it into the office to provide personal wireless access has installed a ____.

A) wardriving point
B) rogue access point
C) VoWLAN handset
D) VoIP handset
سؤال
In October 2002, the WECA organization changed its name to ____.

A) Wi-Fi (Wireless Fidelity) Alliance
B) WiMAX
C) VoWLAN
D) Project 802
سؤال
Typically all rogue access points have security features implemented.
سؤال
Wireless LAN applications can be found in every industry whose employees need or want to conduct business without being confined to a specific location.
سؤال
In the United States, the organization that controls and regulates wireless transmissions for use by citizens (as opposed to the federal government) is the ____.

A) IEEE
B) Wi-Fi Alliance
C) FCC
D) FDA
سؤال
Security attacks are isolated against organizations.
سؤال
____ protects the integrity, confidentiality, and availability of information on the devices that store, manipulate, and transmit the information through products, people, and procedures.

A) Information security
B) VoWLAN
C) FCC
D) FDA
سؤال
____________________ uses the existing data WLAN to make and receive telephone calls.
سؤال
The term ____________________ is frequently used to describe the tasks of guarding information that is in a digital format.
سؤال
A(n) ____________________ attack occurs when an attacker discovers and exploits a previously unknown flaw.
سؤال
Briefly explain how wireless technology increases network reliability.
سؤال
What are the benefits to businesses provided by wireless LANs?
سؤال
How does radio frequency interference affect wireless networks?
سؤال
Briefly describe the main characteristics of the IEEE.
سؤال
What are some of the characteristics of information that must be protected by information security?
سؤال
For computer networking and wireless communications the most widely known and influential organization is the ____________________.
سؤال
The ____ is the entire range of all radio frequencies.

A) unregulated bands
B) license-exempt spectrum
C) infrared light
D) radio frequency spectrum
سؤال
The ____ band is intended for devices that provide short-range, high-speed wireless digital communications.

A) CDMA
B) ISM
C) UNII
D) GSM
سؤال
The IEEE ____ standard specified that wireless transmissions could take place in one of two ways. The first is through infrared light, and the other type of transmission is by sending radio signals.

A) 802.1
B) 802.3
C) 802.8
D) 802.11
سؤال
A(n) ____________________ site has all the equipment needed for an organization to continue running, including office space and furniture, telephone jacks, computer equipment, and a live telecommunications link.
سؤال
How does the speed of attacks factor make security increasingly difficult?
سؤال
The IEEE ____ standard specifies a maximum rated speed of 54 Mbps and also supports 48, 36, 24, 18, 12, 9, and 6 Mbps transmissions using the UNII band.

A) 802.11
B) 802.11a
C) 802.11b
D) 802.11z
سؤال
The 802.11g standard, which is backward-compatible with 802.11b, specifies that devices operate entirely in the ____ frequency.

A) UNII
B) GSM
C) CDMA
D) ISM
سؤال
The radio frequency spectrum is divided into over 450 different sections or ____.

A) bands
B) amplitudes
C) wavelengths
D) heights
سؤال
Briefly explain how wireless technology benefits the health care industry.
سؤال
Briefly describe WECA main goals.
سؤال
What are the six certifications within CWNP?
سؤال
What are the main characteristics of the IEEE 802.11b standard?
سؤال
Match between columns
standards for how WLANs connect to external networks such as the Internet or cellular networks.
Firewalls
standards for how WLANs connect to external networks such as the Internet or cellular networks.
Security
standards for how WLANs connect to external networks such as the Internet or cellular networks.
The FCC
standards for how WLANs connect to external networks such as the Internet or cellular networks.
IEEE 802.11n
standards for how WLANs connect to external networks such as the Internet or cellular networks.
IEEE 802.11u
standards for how WLANs connect to external networks such as the Internet or cellular networks.
IEEE
standards for how WLANs connect to external networks such as the Internet or cellular networks.
Unregulated bands
standards for how WLANs connect to external networks such as the Internet or cellular networks.
Distributed attacks
standards for how WLANs connect to external networks such as the Internet or cellular networks.
AreTec
also known as Multiple-Input, Multiple-Output Enhanced WLAN (MEW).
Firewalls
also known as Multiple-Input, Multiple-Output Enhanced WLAN (MEW).
Security
also known as Multiple-Input, Multiple-Output Enhanced WLAN (MEW).
The FCC
also known as Multiple-Input, Multiple-Output Enhanced WLAN (MEW).
IEEE 802.11n
also known as Multiple-Input, Multiple-Output Enhanced WLAN (MEW).
IEEE 802.11u
also known as Multiple-Input, Multiple-Output Enhanced WLAN (MEW).
IEEE
also known as Multiple-Input, Multiple-Output Enhanced WLAN (MEW).
Unregulated bands
also known as Multiple-Input, Multiple-Output Enhanced WLAN (MEW).
Distributed attacks
also known as Multiple-Input, Multiple-Output Enhanced WLAN (MEW).
AreTec
factor that makes security increasingly difficult.
Firewalls
factor that makes security increasingly difficult.
Security
factor that makes security increasingly difficult.
The FCC
factor that makes security increasingly difficult.
IEEE 802.11n
factor that makes security increasingly difficult.
IEEE 802.11u
factor that makes security increasingly difficult.
IEEE
factor that makes security increasingly difficult.
Unregulated bands
factor that makes security increasingly difficult.
Distributed attacks
factor that makes security increasingly difficult.
AreTec
restrict specific types of malware from entering a network.
Firewalls
restrict specific types of malware from entering a network.
Security
restrict specific types of malware from entering a network.
The FCC
restrict specific types of malware from entering a network.
IEEE 802.11n
restrict specific types of malware from entering a network.
IEEE 802.11u
restrict specific types of malware from entering a network.
IEEE
restrict specific types of malware from entering a network.
Unregulated bands
restrict specific types of malware from entering a network.
Distributed attacks
restrict specific types of malware from entering a network.
AreTec
an independent government agency that is directly responsible to Congress.
Firewalls
an independent government agency that is directly responsible to Congress.
Security
an independent government agency that is directly responsible to Congress.
The FCC
an independent government agency that is directly responsible to Congress.
IEEE 802.11n
an independent government agency that is directly responsible to Congress.
IEEE 802.11u
an independent government agency that is directly responsible to Congress.
IEEE
an independent government agency that is directly responsible to Congress.
Unregulated bands
an independent government agency that is directly responsible to Congress.
Distributed attacks
an independent government agency that is directly responsible to Congress.
AreTec
bands of the radio spectrum that are available nationwide to all users, without requiring a license.
Firewalls
bands of the radio spectrum that are available nationwide to all users, without requiring a license.
Security
bands of the radio spectrum that are available nationwide to all users, without requiring a license.
The FCC
bands of the radio spectrum that are available nationwide to all users, without requiring a license.
IEEE 802.11n
bands of the radio spectrum that are available nationwide to all users, without requiring a license.
IEEE 802.11u
bands of the radio spectrum that are available nationwide to all users, without requiring a license.
IEEE
bands of the radio spectrum that are available nationwide to all users, without requiring a license.
Unregulated bands
bands of the radio spectrum that are available nationwide to all users, without requiring a license.
Distributed attacks
bands of the radio spectrum that are available nationwide to all users, without requiring a license.
AreTec
organization that promotes standardization in wireless technologies.
Firewalls
organization that promotes standardization in wireless technologies.
Security
organization that promotes standardization in wireless technologies.
The FCC
organization that promotes standardization in wireless technologies.
IEEE 802.11n
organization that promotes standardization in wireless technologies.
IEEE 802.11u
organization that promotes standardization in wireless technologies.
IEEE
organization that promotes standardization in wireless technologies.
Unregulated bands
organization that promotes standardization in wireless technologies.
Distributed attacks
organization that promotes standardization in wireless technologies.
AreTec
greatest disadvantage to wireless LANs.
Firewalls
greatest disadvantage to wireless LANs.
Security
greatest disadvantage to wireless LANs.
The FCC
greatest disadvantage to wireless LANs.
IEEE 802.11n
greatest disadvantage to wireless LANs.
IEEE 802.11u
greatest disadvantage to wireless LANs.
IEEE
greatest disadvantage to wireless LANs.
Unregulated bands
greatest disadvantage to wireless LANs.
Distributed attacks
greatest disadvantage to wireless LANs.
AreTec
the world's largest technical professional society with members around the globe.
Firewalls
the world's largest technical professional society with members around the globe.
Security
the world's largest technical professional society with members around the globe.
The FCC
the world's largest technical professional society with members around the globe.
IEEE 802.11n
the world's largest technical professional society with members around the globe.
IEEE 802.11u
the world's largest technical professional society with members around the globe.
IEEE
the world's largest technical professional society with members around the globe.
Unregulated bands
the world's largest technical professional society with members around the globe.
Distributed attacks
the world's largest technical professional society with members around the globe.
AreTec
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/42
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 1: Foundations of Wireless Security
1
IEEE ____ standards set specifications for Ethernet local area network technology.

A) 802.3
B) 802.5
C) 802.11
D) 802.20
A
2
Individuals who actively search for wireless signals to pick up, often by simply driving down the street, are participating in an activity known as ____.

A) AP war
B) wireless war
C) access driving
D) wardriving
D
3
____ is a general term used to describe worms, viruses, spyware, or other types of software with a malicious intent.

A) Wireless packet sniffer
B) VoWLAN
C) VoIP
D) Malware
D
4
Just as a WLAN gives users mobility for accessing data, ____ provides that same freedom for voice communication.

A) 802.11n
B) WiMAX
C) VoWLAN
D) 802.11i
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
5
A ____ network can determine the optimum route for a packet to travel across the WLAN based on the quality required.

A) flat
B) mesh
C) single
D) linked
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
6
A ____ site provides office space but the customer must provide and install all the equipment needed to continue operations.

A) cold
B) hot
C) warm
D) red
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
7
The primary advantage of wireless technology is ____.

A) easier and less expensive installation
B) mobility
C) security
D) disaster recovery
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
8
The FDA serves as the primary regulatory agency for wireless communications in the United States and its territorial possessions.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
9
Along with the many advantages of WLAN technology there are disadvantages and concerns. These include radio frequency interference, health risks, and ____.

A) mobility
B) network reliability
C) installation costs
D) security
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
10
____ is software (or sometimes hardware) that allows to view the contents of wireless packets.

A) Spyware
B) Malware
C) Wireless packet sniffer
D) Adware
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
11
Educational institutions were some of the first adopters of WLANs because of their dramatic advantages in teaching and learning.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
12
In the early 1980s, the IEEE began work on developing computer network architecture standards. Its work was called ____.

A) WLAN
B) Wi-Fi
C) Project 802
D) WiMAX
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
13
The ____ establishes standards for telecommunications.

A) FDA
B) IEEE
C) PDA
D) VoIP
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
14
An employee who purchases a wireless access point and brings it into the office to provide personal wireless access has installed a ____.

A) wardriving point
B) rogue access point
C) VoWLAN handset
D) VoIP handset
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
15
In October 2002, the WECA organization changed its name to ____.

A) Wi-Fi (Wireless Fidelity) Alliance
B) WiMAX
C) VoWLAN
D) Project 802
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
16
Typically all rogue access points have security features implemented.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
17
Wireless LAN applications can be found in every industry whose employees need or want to conduct business without being confined to a specific location.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
18
In the United States, the organization that controls and regulates wireless transmissions for use by citizens (as opposed to the federal government) is the ____.

A) IEEE
B) Wi-Fi Alliance
C) FCC
D) FDA
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
19
Security attacks are isolated against organizations.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
20
____ protects the integrity, confidentiality, and availability of information on the devices that store, manipulate, and transmit the information through products, people, and procedures.

A) Information security
B) VoWLAN
C) FCC
D) FDA
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
21
____________________ uses the existing data WLAN to make and receive telephone calls.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
22
The term ____________________ is frequently used to describe the tasks of guarding information that is in a digital format.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
23
A(n) ____________________ attack occurs when an attacker discovers and exploits a previously unknown flaw.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
24
Briefly explain how wireless technology increases network reliability.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
25
What are the benefits to businesses provided by wireless LANs?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
26
How does radio frequency interference affect wireless networks?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
27
Briefly describe the main characteristics of the IEEE.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
28
What are some of the characteristics of information that must be protected by information security?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
29
For computer networking and wireless communications the most widely known and influential organization is the ____________________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
30
The ____ is the entire range of all radio frequencies.

A) unregulated bands
B) license-exempt spectrum
C) infrared light
D) radio frequency spectrum
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
31
The ____ band is intended for devices that provide short-range, high-speed wireless digital communications.

A) CDMA
B) ISM
C) UNII
D) GSM
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
32
The IEEE ____ standard specified that wireless transmissions could take place in one of two ways. The first is through infrared light, and the other type of transmission is by sending radio signals.

A) 802.1
B) 802.3
C) 802.8
D) 802.11
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
33
A(n) ____________________ site has all the equipment needed for an organization to continue running, including office space and furniture, telephone jacks, computer equipment, and a live telecommunications link.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
34
How does the speed of attacks factor make security increasingly difficult?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
35
The IEEE ____ standard specifies a maximum rated speed of 54 Mbps and also supports 48, 36, 24, 18, 12, 9, and 6 Mbps transmissions using the UNII band.

A) 802.11
B) 802.11a
C) 802.11b
D) 802.11z
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
36
The 802.11g standard, which is backward-compatible with 802.11b, specifies that devices operate entirely in the ____ frequency.

A) UNII
B) GSM
C) CDMA
D) ISM
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
37
The radio frequency spectrum is divided into over 450 different sections or ____.

A) bands
B) amplitudes
C) wavelengths
D) heights
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
38
Briefly explain how wireless technology benefits the health care industry.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
39
Briefly describe WECA main goals.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
40
What are the six certifications within CWNP?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
41
What are the main characteristics of the IEEE 802.11b standard?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
42
Match between columns
standards for how WLANs connect to external networks such as the Internet or cellular networks.
Firewalls
standards for how WLANs connect to external networks such as the Internet or cellular networks.
Security
standards for how WLANs connect to external networks such as the Internet or cellular networks.
The FCC
standards for how WLANs connect to external networks such as the Internet or cellular networks.
IEEE 802.11n
standards for how WLANs connect to external networks such as the Internet or cellular networks.
IEEE 802.11u
standards for how WLANs connect to external networks such as the Internet or cellular networks.
IEEE
standards for how WLANs connect to external networks such as the Internet or cellular networks.
Unregulated bands
standards for how WLANs connect to external networks such as the Internet or cellular networks.
Distributed attacks
standards for how WLANs connect to external networks such as the Internet or cellular networks.
AreTec
also known as Multiple-Input, Multiple-Output Enhanced WLAN (MEW).
Firewalls
also known as Multiple-Input, Multiple-Output Enhanced WLAN (MEW).
Security
also known as Multiple-Input, Multiple-Output Enhanced WLAN (MEW).
The FCC
also known as Multiple-Input, Multiple-Output Enhanced WLAN (MEW).
IEEE 802.11n
also known as Multiple-Input, Multiple-Output Enhanced WLAN (MEW).
IEEE 802.11u
also known as Multiple-Input, Multiple-Output Enhanced WLAN (MEW).
IEEE
also known as Multiple-Input, Multiple-Output Enhanced WLAN (MEW).
Unregulated bands
also known as Multiple-Input, Multiple-Output Enhanced WLAN (MEW).
Distributed attacks
also known as Multiple-Input, Multiple-Output Enhanced WLAN (MEW).
AreTec
factor that makes security increasingly difficult.
Firewalls
factor that makes security increasingly difficult.
Security
factor that makes security increasingly difficult.
The FCC
factor that makes security increasingly difficult.
IEEE 802.11n
factor that makes security increasingly difficult.
IEEE 802.11u
factor that makes security increasingly difficult.
IEEE
factor that makes security increasingly difficult.
Unregulated bands
factor that makes security increasingly difficult.
Distributed attacks
factor that makes security increasingly difficult.
AreTec
restrict specific types of malware from entering a network.
Firewalls
restrict specific types of malware from entering a network.
Security
restrict specific types of malware from entering a network.
The FCC
restrict specific types of malware from entering a network.
IEEE 802.11n
restrict specific types of malware from entering a network.
IEEE 802.11u
restrict specific types of malware from entering a network.
IEEE
restrict specific types of malware from entering a network.
Unregulated bands
restrict specific types of malware from entering a network.
Distributed attacks
restrict specific types of malware from entering a network.
AreTec
an independent government agency that is directly responsible to Congress.
Firewalls
an independent government agency that is directly responsible to Congress.
Security
an independent government agency that is directly responsible to Congress.
The FCC
an independent government agency that is directly responsible to Congress.
IEEE 802.11n
an independent government agency that is directly responsible to Congress.
IEEE 802.11u
an independent government agency that is directly responsible to Congress.
IEEE
an independent government agency that is directly responsible to Congress.
Unregulated bands
an independent government agency that is directly responsible to Congress.
Distributed attacks
an independent government agency that is directly responsible to Congress.
AreTec
bands of the radio spectrum that are available nationwide to all users, without requiring a license.
Firewalls
bands of the radio spectrum that are available nationwide to all users, without requiring a license.
Security
bands of the radio spectrum that are available nationwide to all users, without requiring a license.
The FCC
bands of the radio spectrum that are available nationwide to all users, without requiring a license.
IEEE 802.11n
bands of the radio spectrum that are available nationwide to all users, without requiring a license.
IEEE 802.11u
bands of the radio spectrum that are available nationwide to all users, without requiring a license.
IEEE
bands of the radio spectrum that are available nationwide to all users, without requiring a license.
Unregulated bands
bands of the radio spectrum that are available nationwide to all users, without requiring a license.
Distributed attacks
bands of the radio spectrum that are available nationwide to all users, without requiring a license.
AreTec
organization that promotes standardization in wireless technologies.
Firewalls
organization that promotes standardization in wireless technologies.
Security
organization that promotes standardization in wireless technologies.
The FCC
organization that promotes standardization in wireless technologies.
IEEE 802.11n
organization that promotes standardization in wireless technologies.
IEEE 802.11u
organization that promotes standardization in wireless technologies.
IEEE
organization that promotes standardization in wireless technologies.
Unregulated bands
organization that promotes standardization in wireless technologies.
Distributed attacks
organization that promotes standardization in wireless technologies.
AreTec
greatest disadvantage to wireless LANs.
Firewalls
greatest disadvantage to wireless LANs.
Security
greatest disadvantage to wireless LANs.
The FCC
greatest disadvantage to wireless LANs.
IEEE 802.11n
greatest disadvantage to wireless LANs.
IEEE 802.11u
greatest disadvantage to wireless LANs.
IEEE
greatest disadvantage to wireless LANs.
Unregulated bands
greatest disadvantage to wireless LANs.
Distributed attacks
greatest disadvantage to wireless LANs.
AreTec
the world's largest technical professional society with members around the globe.
Firewalls
the world's largest technical professional society with members around the globe.
Security
the world's largest technical professional society with members around the globe.
The FCC
the world's largest technical professional society with members around the globe.
IEEE 802.11n
the world's largest technical professional society with members around the globe.
IEEE 802.11u
the world's largest technical professional society with members around the globe.
IEEE
the world's largest technical professional society with members around the globe.
Unregulated bands
the world's largest technical professional society with members around the globe.
Distributed attacks
the world's largest technical professional society with members around the globe.
AreTec
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.