Matching
Match each term with the correct statement below.
Premises:
attacker floods the radio frequency spectrum with noise
person who has been hired to break into a computer and steal information
series of 1's and 0's equal in length to the text plus the ICV
key value that is used to encrypt wireless data transmissions when they are sent
person who violates system security with malicious intent
encryption algorithm
person who uses his or her advanced computer skills to attack computers but not with a malicious intent
limit a user's admission to the access point
unskilled or novice users who break into computer systems with malicious intent
Responses:
cipher
jam
script kiddies
computer spy
cracker
hacker
keystream
filter
default key
Correct Answer:
Premises:
Responses:
attacker floods the radio frequency spectrum with noise
person who has been hired to break into a computer and steal information
series of 1's and 0's equal in length to the text plus the ICV
key value that is used to encrypt wireless data transmissions when they are sent
person who violates system security with malicious intent
encryption algorithm
person who uses his or her advanced computer skills to attack computers but not with a malicious intent
limit a user's admission to the access point
unskilled or novice users who break into computer systems with malicious intent
Premises:
attacker floods the radio frequency spectrum with noise
person who has been hired to break into a computer and steal information
series of 1's and 0's equal in length to the text plus the ICV
key value that is used to encrypt wireless data transmissions when they are sent
person who violates system security with malicious intent
encryption algorithm
person who uses his or her advanced computer skills to attack computers but not with a malicious intent
limit a user's admission to the access point
unskilled or novice users who break into computer systems with malicious intent
Responses:
Related Questions
Q26: Describe the five steps in the process
Q33: The term _ is frequently used to
Q34: In a(n) _ attack, an attacker attempts
Q35: What are the three characteristics of information
Q36: Describe open system authentication.
Q36: On wireless networks, _ attacks are commonly
Q38: Briefly describe cryptography and discuss its history.
Q39: Access _ is intended to guard one
Q40: Describe a man-in-the-middle attack.
Q50: What is a dictionary attack?
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents