Deck 11: Managing a Wireless LAN

Full screen (f)
exit full mode
Question
Which of the following is NOT a component of using SNMP for network monitoring?

A) software agent
B) MIB
C) management station
D) event log
Use Space or
up arrow
down arrow
to flip the card.
Question
One of the goals of a security policy is to implement control.
Question
Successful social engineering attacks rely on the weakness of people.
Question
A threat agent is software installed on a computer that monitors for potential threats to the computer.
Question
Which form of social engineering often takes place as an e-mail message falsely claiming to be from a legitimate sender in an attempt to get private information?

A) exploitation
B) phishing
C) sandbagging
D) hacking
Question
Which of the following are NOT among the several defenses against attacks?

A) using security policies
B) security training
C) random employee security scans
D) physical security
Question
What is a difference between RMON and SNMP?

A) RMON uses MIBs
B) SNMP gathers network statistics
C) RMON uses dedicated devices
D) RMON is found on enterprise-level APs
Question
Which of the following is a flaw or weakness that allows an attacker to bypass security?

A) exploiting
B) vulnerability
C) threat agent
D) risk
Question
As an insurance company,the customer data that you store on your servers should be considered which of the following?

A) threat
B) vulnerability
C) risk
D) asset
Question
What does an updated enterprise-level AP use to distribute the latest update to other APs on the WLAN?

A) IP multicast
B) TCP unicast
C) Data Link broadcast
D) UDP simulcast
Question
Risk mitigation involves determining the damage that would result from an attack and the likelihood that the vulnerability is a risk to the organization.
Question
Which of the following is NOT typically included in an impact analysis?

A) asset identification
B) remediation process
C) threat evaluation
D) risk mitigation
Question
Which of the following is true of security policies?

A) users will always comply with the policies
B) once a policy is in affect,monitoring is not necessary
C) policies should not be too restrictive
D) users accept that security policies enhance their productivity
Question
The point of RF site tuning is to locate where APs should be mounted.
Question
What is the first phase of the development of a security policy likely to involve?

A) remediation of employees that violate the policy
B) review of the policy for compliance
C) vulnerability assessment
D) an outline of how the organization will respond to attacks
Question
Which type of policy defines the actions users may perform while accessing the network?

A) acceptable use policy
B) password policy
C) system-specific policy
D) physical device policy
Question
Which of the following is NOT an option when dealing with risk?

A) accept the risk
B) exploit the risk
C) diminish the risk
D) transfer the risk
Question
What is the most common method for updating an AP's capabilities?

A) installing a new EEPROM
B) downloading new firmware
C) sending the AP back to the manufacturer
D) rebooting with a new installation CD
Question
Impersonation falls into which category of attack?

A) man-in-the-middle
B) virus
C) social engineering
D) Trojan horse
Question
Which best describes kinesthetic learners?

A) learn by watching presentations
B) work well with hands-on environments
C) learn best through lectures
D) tend to like taking notes
Question
List and describe three RF site tuning settings.
Question
List three types of security policy.
Question
In order to use SNMP,a software ____________________ is loaded onto each network device that will be managed using SNMP.
Question
____________________ is software that is embedded into hardware to control the device.
Question
What are the two aspects of procedural security defenses?
Question
Which of the following are functions an organization's security policy can serve? (Choose all that apply.)

A)describe an overall intention and direction
B)detail specific risks
C)help to instill security awareness
D)dictate the tools the IT department must use to maintain security
Question
Describe social engineering.
Question
Although data from the access point and devices can be beneficial,there are drawbacks to relying solely on these sources of information.What are the drawbacks?
Question
What is RMON?
Question
What are frequently the weakest link in information security?

A) wireless networks
B) passwords
C) unmanaged switches
D) malfunctioning routers
Question
Which of the following types of information can you expect from an enterprise-level AP?

A)DNS query attempts
B)event log
C)routing table data
D)wireless transmission statistics
Question
List the five assessments involved in creating a vulnerability assessment.
Question
A ___________________ assessment attempts to identify what needs to be protected,what the pressures are against it,and how susceptible the current protection is.
Question
Which of the following are drawbacks of relying solely on wireless devices and APs as sources network monitoring information?

A)data collection can be time consuming
B)data is not gathered in real time
C)gathered data may not be timely
D)data retention can be difficult
Question
Provide a thorough definition of security policy.
Question
Many enterprise-level access points provide utilities that offer three types of information.What are they?
Question
____________________ engineering relies on tricking or deceiving someone to give a hacker access to a system.
Question
____________________ is a nonvolatile storage chip that uses byte-wise writable memories.
Question
Which of the following are RF site tuning settings? (Choose all that apply.)

A)adjust transmission frequency
B)adjust radio power levels on APs
C)adjust channel settings
D)validate coverage area
Question
What is the final phase of developing a security policy?
Question
Match between columns
the task of identifying and categorizing assets
exploiting
the task of identifying and categorizing assets
MIB
the task of identifying and categorizing assets
threat
the task of identifying and categorizing assets
impact analysis
the task of identifying and categorizing assets
acceptable use policy
the task of identifying and categorizing assets
asset management
the task of identifying and categorizing assets
RF site tuning
the task of identifying and categorizing assets
event log
the task of identifying and categorizing assets
risk
the task of identifying and categorizing assets
vulnerability
a systematic and methodical evaluation of the exposure of assets to attackers,forces of nature,or any other entity that is a potential harm
exploiting
a systematic and methodical evaluation of the exposure of assets to attackers,forces of nature,or any other entity that is a potential harm
MIB
a systematic and methodical evaluation of the exposure of assets to attackers,forces of nature,or any other entity that is a potential harm
threat
a systematic and methodical evaluation of the exposure of assets to attackers,forces of nature,or any other entity that is a potential harm
impact analysis
a systematic and methodical evaluation of the exposure of assets to attackers,forces of nature,or any other entity that is a potential harm
acceptable use policy
a systematic and methodical evaluation of the exposure of assets to attackers,forces of nature,or any other entity that is a potential harm
asset management
a systematic and methodical evaluation of the exposure of assets to attackers,forces of nature,or any other entity that is a potential harm
RF site tuning
a systematic and methodical evaluation of the exposure of assets to attackers,forces of nature,or any other entity that is a potential harm
event log
a systematic and methodical evaluation of the exposure of assets to attackers,forces of nature,or any other entity that is a potential harm
risk
a systematic and methodical evaluation of the exposure of assets to attackers,forces of nature,or any other entity that is a potential harm
vulnerability
a policy that defines the actions users may perform while accessing systems and networking equipment
exploiting
a policy that defines the actions users may perform while accessing systems and networking equipment
MIB
a policy that defines the actions users may perform while accessing systems and networking equipment
threat
a policy that defines the actions users may perform while accessing systems and networking equipment
impact analysis
a policy that defines the actions users may perform while accessing systems and networking equipment
acceptable use policy
a policy that defines the actions users may perform while accessing systems and networking equipment
asset management
a policy that defines the actions users may perform while accessing systems and networking equipment
RF site tuning
a policy that defines the actions users may perform while accessing systems and networking equipment
event log
a policy that defines the actions users may perform while accessing systems and networking equipment
risk
a policy that defines the actions users may perform while accessing systems and networking equipment
vulnerability
taking advantage of a vulnerability
exploiting
taking advantage of a vulnerability
MIB
taking advantage of a vulnerability
threat
taking advantage of a vulnerability
impact analysis
taking advantage of a vulnerability
acceptable use policy
taking advantage of a vulnerability
asset management
taking advantage of a vulnerability
RF site tuning
taking advantage of a vulnerability
event log
taking advantage of a vulnerability
risk
taking advantage of a vulnerability
vulnerability
a type of action that has the potential to cause harm
exploiting
a type of action that has the potential to cause harm
MIB
a type of action that has the potential to cause harm
threat
a type of action that has the potential to cause harm
impact analysis
a type of action that has the potential to cause harm
acceptable use policy
a type of action that has the potential to cause harm
asset management
a type of action that has the potential to cause harm
RF site tuning
a type of action that has the potential to cause harm
event log
a type of action that has the potential to cause harm
risk
a type of action that has the potential to cause harm
vulnerability
the likelihood that a threat agent will exploit a vulnerability
exploiting
the likelihood that a threat agent will exploit a vulnerability
MIB
the likelihood that a threat agent will exploit a vulnerability
threat
the likelihood that a threat agent will exploit a vulnerability
impact analysis
the likelihood that a threat agent will exploit a vulnerability
acceptable use policy
the likelihood that a threat agent will exploit a vulnerability
asset management
the likelihood that a threat agent will exploit a vulnerability
RF site tuning
the likelihood that a threat agent will exploit a vulnerability
event log
the likelihood that a threat agent will exploit a vulnerability
risk
the likelihood that a threat agent will exploit a vulnerability
vulnerability
a flaw or weakness that allows a threat agent to bypass security
exploiting
a flaw or weakness that allows a threat agent to bypass security
MIB
a flaw or weakness that allows a threat agent to bypass security
threat
a flaw or weakness that allows a threat agent to bypass security
impact analysis
a flaw or weakness that allows a threat agent to bypass security
acceptable use policy
a flaw or weakness that allows a threat agent to bypass security
asset management
a flaw or weakness that allows a threat agent to bypass security
RF site tuning
a flaw or weakness that allows a threat agent to bypass security
event log
a flaw or weakness that allows a threat agent to bypass security
risk
a flaw or weakness that allows a threat agent to bypass security
vulnerability
a record of events
exploiting
a record of events
MIB
a record of events
threat
a record of events
impact analysis
a record of events
acceptable use policy
a record of events
asset management
a record of events
RF site tuning
a record of events
event log
a record of events
risk
a record of events
vulnerability
adjustments to a WLAN performed as part of routine maintenance
exploiting
adjustments to a WLAN performed as part of routine maintenance
MIB
adjustments to a WLAN performed as part of routine maintenance
threat
adjustments to a WLAN performed as part of routine maintenance
impact analysis
adjustments to a WLAN performed as part of routine maintenance
acceptable use policy
adjustments to a WLAN performed as part of routine maintenance
asset management
adjustments to a WLAN performed as part of routine maintenance
RF site tuning
adjustments to a WLAN performed as part of routine maintenance
event log
adjustments to a WLAN performed as part of routine maintenance
risk
adjustments to a WLAN performed as part of routine maintenance
vulnerability
the storage area in which SNMP software agents store their data
exploiting
the storage area in which SNMP software agents store their data
MIB
the storage area in which SNMP software agents store their data
threat
the storage area in which SNMP software agents store their data
impact analysis
the storage area in which SNMP software agents store their data
acceptable use policy
the storage area in which SNMP software agents store their data
asset management
the storage area in which SNMP software agents store their data
RF site tuning
the storage area in which SNMP software agents store their data
event log
the storage area in which SNMP software agents store their data
risk
the storage area in which SNMP software agents store their data
vulnerability
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/41
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 11: Managing a Wireless LAN
1
Which of the following is NOT a component of using SNMP for network monitoring?

A) software agent
B) MIB
C) management station
D) event log
D
2
One of the goals of a security policy is to implement control.
True
3
Successful social engineering attacks rely on the weakness of people.
True
4
A threat agent is software installed on a computer that monitors for potential threats to the computer.
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
5
Which form of social engineering often takes place as an e-mail message falsely claiming to be from a legitimate sender in an attempt to get private information?

A) exploitation
B) phishing
C) sandbagging
D) hacking
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
6
Which of the following are NOT among the several defenses against attacks?

A) using security policies
B) security training
C) random employee security scans
D) physical security
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
7
What is a difference between RMON and SNMP?

A) RMON uses MIBs
B) SNMP gathers network statistics
C) RMON uses dedicated devices
D) RMON is found on enterprise-level APs
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
8
Which of the following is a flaw or weakness that allows an attacker to bypass security?

A) exploiting
B) vulnerability
C) threat agent
D) risk
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
9
As an insurance company,the customer data that you store on your servers should be considered which of the following?

A) threat
B) vulnerability
C) risk
D) asset
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
10
What does an updated enterprise-level AP use to distribute the latest update to other APs on the WLAN?

A) IP multicast
B) TCP unicast
C) Data Link broadcast
D) UDP simulcast
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
11
Risk mitigation involves determining the damage that would result from an attack and the likelihood that the vulnerability is a risk to the organization.
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
12
Which of the following is NOT typically included in an impact analysis?

A) asset identification
B) remediation process
C) threat evaluation
D) risk mitigation
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
13
Which of the following is true of security policies?

A) users will always comply with the policies
B) once a policy is in affect,monitoring is not necessary
C) policies should not be too restrictive
D) users accept that security policies enhance their productivity
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
14
The point of RF site tuning is to locate where APs should be mounted.
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
15
What is the first phase of the development of a security policy likely to involve?

A) remediation of employees that violate the policy
B) review of the policy for compliance
C) vulnerability assessment
D) an outline of how the organization will respond to attacks
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
16
Which type of policy defines the actions users may perform while accessing the network?

A) acceptable use policy
B) password policy
C) system-specific policy
D) physical device policy
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
17
Which of the following is NOT an option when dealing with risk?

A) accept the risk
B) exploit the risk
C) diminish the risk
D) transfer the risk
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
18
What is the most common method for updating an AP's capabilities?

A) installing a new EEPROM
B) downloading new firmware
C) sending the AP back to the manufacturer
D) rebooting with a new installation CD
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
19
Impersonation falls into which category of attack?

A) man-in-the-middle
B) virus
C) social engineering
D) Trojan horse
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
20
Which best describes kinesthetic learners?

A) learn by watching presentations
B) work well with hands-on environments
C) learn best through lectures
D) tend to like taking notes
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
21
List and describe three RF site tuning settings.
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
22
List three types of security policy.
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
23
In order to use SNMP,a software ____________________ is loaded onto each network device that will be managed using SNMP.
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
24
____________________ is software that is embedded into hardware to control the device.
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
25
What are the two aspects of procedural security defenses?
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
26
Which of the following are functions an organization's security policy can serve? (Choose all that apply.)

A)describe an overall intention and direction
B)detail specific risks
C)help to instill security awareness
D)dictate the tools the IT department must use to maintain security
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
27
Describe social engineering.
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
28
Although data from the access point and devices can be beneficial,there are drawbacks to relying solely on these sources of information.What are the drawbacks?
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
29
What is RMON?
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
30
What are frequently the weakest link in information security?

A) wireless networks
B) passwords
C) unmanaged switches
D) malfunctioning routers
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
31
Which of the following types of information can you expect from an enterprise-level AP?

A)DNS query attempts
B)event log
C)routing table data
D)wireless transmission statistics
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
32
List the five assessments involved in creating a vulnerability assessment.
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
33
A ___________________ assessment attempts to identify what needs to be protected,what the pressures are against it,and how susceptible the current protection is.
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
34
Which of the following are drawbacks of relying solely on wireless devices and APs as sources network monitoring information?

A)data collection can be time consuming
B)data is not gathered in real time
C)gathered data may not be timely
D)data retention can be difficult
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
35
Provide a thorough definition of security policy.
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
36
Many enterprise-level access points provide utilities that offer three types of information.What are they?
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
37
____________________ engineering relies on tricking or deceiving someone to give a hacker access to a system.
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
38
____________________ is a nonvolatile storage chip that uses byte-wise writable memories.
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
39
Which of the following are RF site tuning settings? (Choose all that apply.)

A)adjust transmission frequency
B)adjust radio power levels on APs
C)adjust channel settings
D)validate coverage area
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
40
What is the final phase of developing a security policy?
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
41
Match between columns
the task of identifying and categorizing assets
exploiting
the task of identifying and categorizing assets
MIB
the task of identifying and categorizing assets
threat
the task of identifying and categorizing assets
impact analysis
the task of identifying and categorizing assets
acceptable use policy
the task of identifying and categorizing assets
asset management
the task of identifying and categorizing assets
RF site tuning
the task of identifying and categorizing assets
event log
the task of identifying and categorizing assets
risk
the task of identifying and categorizing assets
vulnerability
a systematic and methodical evaluation of the exposure of assets to attackers,forces of nature,or any other entity that is a potential harm
exploiting
a systematic and methodical evaluation of the exposure of assets to attackers,forces of nature,or any other entity that is a potential harm
MIB
a systematic and methodical evaluation of the exposure of assets to attackers,forces of nature,or any other entity that is a potential harm
threat
a systematic and methodical evaluation of the exposure of assets to attackers,forces of nature,or any other entity that is a potential harm
impact analysis
a systematic and methodical evaluation of the exposure of assets to attackers,forces of nature,or any other entity that is a potential harm
acceptable use policy
a systematic and methodical evaluation of the exposure of assets to attackers,forces of nature,or any other entity that is a potential harm
asset management
a systematic and methodical evaluation of the exposure of assets to attackers,forces of nature,or any other entity that is a potential harm
RF site tuning
a systematic and methodical evaluation of the exposure of assets to attackers,forces of nature,or any other entity that is a potential harm
event log
a systematic and methodical evaluation of the exposure of assets to attackers,forces of nature,or any other entity that is a potential harm
risk
a systematic and methodical evaluation of the exposure of assets to attackers,forces of nature,or any other entity that is a potential harm
vulnerability
a policy that defines the actions users may perform while accessing systems and networking equipment
exploiting
a policy that defines the actions users may perform while accessing systems and networking equipment
MIB
a policy that defines the actions users may perform while accessing systems and networking equipment
threat
a policy that defines the actions users may perform while accessing systems and networking equipment
impact analysis
a policy that defines the actions users may perform while accessing systems and networking equipment
acceptable use policy
a policy that defines the actions users may perform while accessing systems and networking equipment
asset management
a policy that defines the actions users may perform while accessing systems and networking equipment
RF site tuning
a policy that defines the actions users may perform while accessing systems and networking equipment
event log
a policy that defines the actions users may perform while accessing systems and networking equipment
risk
a policy that defines the actions users may perform while accessing systems and networking equipment
vulnerability
taking advantage of a vulnerability
exploiting
taking advantage of a vulnerability
MIB
taking advantage of a vulnerability
threat
taking advantage of a vulnerability
impact analysis
taking advantage of a vulnerability
acceptable use policy
taking advantage of a vulnerability
asset management
taking advantage of a vulnerability
RF site tuning
taking advantage of a vulnerability
event log
taking advantage of a vulnerability
risk
taking advantage of a vulnerability
vulnerability
a type of action that has the potential to cause harm
exploiting
a type of action that has the potential to cause harm
MIB
a type of action that has the potential to cause harm
threat
a type of action that has the potential to cause harm
impact analysis
a type of action that has the potential to cause harm
acceptable use policy
a type of action that has the potential to cause harm
asset management
a type of action that has the potential to cause harm
RF site tuning
a type of action that has the potential to cause harm
event log
a type of action that has the potential to cause harm
risk
a type of action that has the potential to cause harm
vulnerability
the likelihood that a threat agent will exploit a vulnerability
exploiting
the likelihood that a threat agent will exploit a vulnerability
MIB
the likelihood that a threat agent will exploit a vulnerability
threat
the likelihood that a threat agent will exploit a vulnerability
impact analysis
the likelihood that a threat agent will exploit a vulnerability
acceptable use policy
the likelihood that a threat agent will exploit a vulnerability
asset management
the likelihood that a threat agent will exploit a vulnerability
RF site tuning
the likelihood that a threat agent will exploit a vulnerability
event log
the likelihood that a threat agent will exploit a vulnerability
risk
the likelihood that a threat agent will exploit a vulnerability
vulnerability
a flaw or weakness that allows a threat agent to bypass security
exploiting
a flaw or weakness that allows a threat agent to bypass security
MIB
a flaw or weakness that allows a threat agent to bypass security
threat
a flaw or weakness that allows a threat agent to bypass security
impact analysis
a flaw or weakness that allows a threat agent to bypass security
acceptable use policy
a flaw or weakness that allows a threat agent to bypass security
asset management
a flaw or weakness that allows a threat agent to bypass security
RF site tuning
a flaw or weakness that allows a threat agent to bypass security
event log
a flaw or weakness that allows a threat agent to bypass security
risk
a flaw or weakness that allows a threat agent to bypass security
vulnerability
a record of events
exploiting
a record of events
MIB
a record of events
threat
a record of events
impact analysis
a record of events
acceptable use policy
a record of events
asset management
a record of events
RF site tuning
a record of events
event log
a record of events
risk
a record of events
vulnerability
adjustments to a WLAN performed as part of routine maintenance
exploiting
adjustments to a WLAN performed as part of routine maintenance
MIB
adjustments to a WLAN performed as part of routine maintenance
threat
adjustments to a WLAN performed as part of routine maintenance
impact analysis
adjustments to a WLAN performed as part of routine maintenance
acceptable use policy
adjustments to a WLAN performed as part of routine maintenance
asset management
adjustments to a WLAN performed as part of routine maintenance
RF site tuning
adjustments to a WLAN performed as part of routine maintenance
event log
adjustments to a WLAN performed as part of routine maintenance
risk
adjustments to a WLAN performed as part of routine maintenance
vulnerability
the storage area in which SNMP software agents store their data
exploiting
the storage area in which SNMP software agents store their data
MIB
the storage area in which SNMP software agents store their data
threat
the storage area in which SNMP software agents store their data
impact analysis
the storage area in which SNMP software agents store their data
acceptable use policy
the storage area in which SNMP software agents store their data
asset management
the storage area in which SNMP software agents store their data
RF site tuning
the storage area in which SNMP software agents store their data
event log
the storage area in which SNMP software agents store their data
risk
the storage area in which SNMP software agents store their data
vulnerability
Unlock Deck
Unlock for access to all 41 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 41 flashcards in this deck.