Deck 9: Wireless LAN Security Vulnerabilities

ملء الشاشة (f)
exit full mode
سؤال
A WLAN can contain many entry points,making security more difficult than with a wired LAN.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
Searching for unprotected wireless networks is called what?

A) WLAN trolling
B) war driving
C) battle testing
D) wireless fishing
سؤال
____ ensures that the information is correct and that no unauthorized person or malicious software has altered it.

A) Integrity
B) Availability
C) Confidentiality
D) Access control
سؤال
Which of the following is NOT an information security layer?

A) products
B) people
C) prevention
D) procedures
سؤال
The process whereby an attacker can trick a corporate mobile device to connect to an impostor AP is referred to as which of the following?

A) inserting network traffic
B) denial of service
C) hijacking the wireless connection
D) reading data
سؤال
A ____ attack on WEP involves identifying two packets derived from the same IV.

A) capture
B) keystream
C) weak key
D) pseudo-random number
سؤال
With WEP,it is impossible for an attacker to identify two packets derived from the same initialization vector.
سؤال
What disadvantage of wireless networks provides the biggest stumbling block to the adoption of wireless technology?

A) availability
B) cost
C) security
D) complexity
سؤال
WEP guards one of the CIA characteristics,namely what?

A) integrity
B) availability
C) confidentiality
D) access control
سؤال
Cleartext that has been encrypted is referred to as which of the following?

A) plaintext
B) cryptography
C) ciphertext
D) keytext
سؤال
Wireless security was implemented well in the original 802.11 standard.
سؤال
A user needs to enter the service set identifier manually when which weak security measure is employed?

A) WEP encryption
B) Open System Authentication
C) SSID hiding
D) shared key authentication
سؤال
Open system authentication and shared key authentication are the two types of wireless authentication available under the 802.11 standard.
سؤال
Attacks that use many computers to attack a single network are called centralized attacks.
سؤال
Which type of access control is implemented by recording the physical address of a wireless client into software running on the AP?

A) NIC blocking
B) MAC address filtering
C) Network blocking
D) IP address filtering
سؤال
A key that creates a detectable pattern is referred to as which of the following?

A) repeating key
B) plain key
C) weak key
D) crypto key
سؤال
Which is true about WEP?

A) uses a shared secret key
B) uses a public/private key pair
C) two keys are maintained
D) must be at least 32 bits in length
سؤال
A rogue AP can be described as which of the following?

A) an AP whose security settings have not been set
B) an AP designed to mimic an authorized AP
C) an AP that has malfunctioned and allows unauthorized users to access it
D) an unauthorized AP brought into the enterprise network
سؤال
On wireless networks,____ attacks are commonly done by attackers setting up an evil twin.

A) spoof
B) weak key
C) DoS
D) man-in-the-middle
سؤال
An attacker spoofs frames to prevent a client from remaining connected to the WLAN.What type of an attack is this?

A) RF jamming
B) man-in-the-middle
C) hijacking
D) denial of service
سؤال
Which of the following are weaknesses of MAC address filtering? (Choose all that apply.)

A) only Windows uses MAC addresses,excluding other OSs from this method
B) MAC addresses can be spoofed
C) the MAC address can be captured by forcing a reassociation
D) MAC address management can be difficult
سؤال
Briefly define cryptography.
سؤال
Describe one weakness of MAC address filtering.
سؤال
What is a distributed attack?
سؤال
Describe how an attacker can hijack a wireless connection.
سؤال
Describe the five steps in the process of WEP encryption.
سؤال
List and describe the three characteristics of information that must be protected by information security?
سؤال
The three protections that must be extended over information can be described by the acronym ________.
سؤال
Describe three limitations of SSID hiding.
سؤال
How have WLANs changed 'hard edges' into 'blurred edges'?
سؤال
Which of the following are difficulties faced in defending attacks? (Choose all that apply.)

A) universally connected devices
B) operating system vendor's lack of concern about security
C) increased speed of attacks
D) attacks that are more complex
سؤال
____________________ ensures that no unauthorized person or software has altered the information.
سؤال
Plaintext data is input into an encryption _________,which consists of procedures based on a mathematical formula used to encrypt the data.
سؤال
Which of the following are among the 802.11 cryptography objectives? (Choose all that apply.)

A) efficient
B) self-synchronizing
C) mandatory
D) exclusive
سؤال
WEP protects _______________ by scrambling the wireless data as it is transmitted.
سؤال
Describe open system authentication.
سؤال
Wireless access control is intended to limit a user's admission to the _______.
سؤال
What three categories can the protections implemented in the original 802.11 standard be divided into? (Choose three.)

A) access control
B) MAC address filtering
C) wired equivalent privacy
D) authentication
سؤال
Describe war driving.
سؤال
Match between columns
an imposter AP that is set up by an attacker
plaintext
an imposter AP that is set up by an attacker
man-in-the-middle
an imposter AP that is set up by an attacker
denial of service
an imposter AP that is set up by an attacker
weak keys
an imposter AP that is set up by an attacker
decryption
an imposter AP that is set up by an attacker
RF jamming
an imposter AP that is set up by an attacker
evil twin
an imposter AP that is set up by an attacker
ciphertext
an imposter AP that is set up by an attacker
keystream
an imposter AP that is set up by an attacker
access control
granting or denying approval to use specific resources
plaintext
granting or denying approval to use specific resources
man-in-the-middle
granting or denying approval to use specific resources
denial of service
granting or denying approval to use specific resources
weak keys
granting or denying approval to use specific resources
decryption
granting or denying approval to use specific resources
RF jamming
granting or denying approval to use specific resources
evil twin
granting or denying approval to use specific resources
ciphertext
granting or denying approval to use specific resources
keystream
granting or denying approval to use specific resources
access control
a DoS attack that floods the RF spectrum with extraneous RF signal "noise" that prevents communications from occurring
plaintext
a DoS attack that floods the RF spectrum with extraneous RF signal "noise" that prevents communications from occurring
man-in-the-middle
a DoS attack that floods the RF spectrum with extraneous RF signal "noise" that prevents communications from occurring
denial of service
a DoS attack that floods the RF spectrum with extraneous RF signal "noise" that prevents communications from occurring
weak keys
a DoS attack that floods the RF spectrum with extraneous RF signal "noise" that prevents communications from occurring
decryption
a DoS attack that floods the RF spectrum with extraneous RF signal "noise" that prevents communications from occurring
RF jamming
a DoS attack that floods the RF spectrum with extraneous RF signal "noise" that prevents communications from occurring
evil twin
a DoS attack that floods the RF spectrum with extraneous RF signal "noise" that prevents communications from occurring
ciphertext
a DoS attack that floods the RF spectrum with extraneous RF signal "noise" that prevents communications from occurring
keystream
a DoS attack that floods the RF spectrum with extraneous RF signal "noise" that prevents communications from occurring
access control
an attack that makes it appear that the wireless device and the network computers are communicating with each other
plaintext
an attack that makes it appear that the wireless device and the network computers are communicating with each other
man-in-the-middle
an attack that makes it appear that the wireless device and the network computers are communicating with each other
denial of service
an attack that makes it appear that the wireless device and the network computers are communicating with each other
weak keys
an attack that makes it appear that the wireless device and the network computers are communicating with each other
decryption
an attack that makes it appear that the wireless device and the network computers are communicating with each other
RF jamming
an attack that makes it appear that the wireless device and the network computers are communicating with each other
evil twin
an attack that makes it appear that the wireless device and the network computers are communicating with each other
ciphertext
an attack that makes it appear that the wireless device and the network computers are communicating with each other
keystream
an attack that makes it appear that the wireless device and the network computers are communicating with each other
access control
cryptographic keys that create a repeating pattern
plaintext
cryptographic keys that create a repeating pattern
man-in-the-middle
cryptographic keys that create a repeating pattern
denial of service
cryptographic keys that create a repeating pattern
weak keys
cryptographic keys that create a repeating pattern
decryption
cryptographic keys that create a repeating pattern
RF jamming
cryptographic keys that create a repeating pattern
evil twin
cryptographic keys that create a repeating pattern
ciphertext
cryptographic keys that create a repeating pattern
keystream
cryptographic keys that create a repeating pattern
access control
the output from a pseudo-random number generator (PRNG)
plaintext
the output from a pseudo-random number generator (PRNG)
man-in-the-middle
the output from a pseudo-random number generator (PRNG)
denial of service
the output from a pseudo-random number generator (PRNG)
weak keys
the output from a pseudo-random number generator (PRNG)
decryption
the output from a pseudo-random number generator (PRNG)
RF jamming
the output from a pseudo-random number generator (PRNG)
evil twin
the output from a pseudo-random number generator (PRNG)
ciphertext
the output from a pseudo-random number generator (PRNG)
keystream
the output from a pseudo-random number generator (PRNG)
access control
an attack that attempts to prevent a device from performing its normal functions
plaintext
an attack that attempts to prevent a device from performing its normal functions
man-in-the-middle
an attack that attempts to prevent a device from performing its normal functions
denial of service
an attack that attempts to prevent a device from performing its normal functions
weak keys
an attack that attempts to prevent a device from performing its normal functions
decryption
an attack that attempts to prevent a device from performing its normal functions
RF jamming
an attack that attempts to prevent a device from performing its normal functions
evil twin
an attack that attempts to prevent a device from performing its normal functions
ciphertext
an attack that attempts to prevent a device from performing its normal functions
keystream
an attack that attempts to prevent a device from performing its normal functions
access control
data input into an encryption algorithm
plaintext
data input into an encryption algorithm
man-in-the-middle
data input into an encryption algorithm
denial of service
data input into an encryption algorithm
weak keys
data input into an encryption algorithm
decryption
data input into an encryption algorithm
RF jamming
data input into an encryption algorithm
evil twin
data input into an encryption algorithm
ciphertext
data input into an encryption algorithm
keystream
data input into an encryption algorithm
access control
the process of changing ciphertext into plaintext
plaintext
the process of changing ciphertext into plaintext
man-in-the-middle
the process of changing ciphertext into plaintext
denial of service
the process of changing ciphertext into plaintext
weak keys
the process of changing ciphertext into plaintext
decryption
the process of changing ciphertext into plaintext
RF jamming
the process of changing ciphertext into plaintext
evil twin
the process of changing ciphertext into plaintext
ciphertext
the process of changing ciphertext into plaintext
keystream
the process of changing ciphertext into plaintext
access control
data that has been encrypted
plaintext
data that has been encrypted
man-in-the-middle
data that has been encrypted
denial of service
data that has been encrypted
weak keys
data that has been encrypted
decryption
data that has been encrypted
RF jamming
data that has been encrypted
evil twin
data that has been encrypted
ciphertext
data that has been encrypted
keystream
data that has been encrypted
access control
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/40
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 9: Wireless LAN Security Vulnerabilities
1
A WLAN can contain many entry points,making security more difficult than with a wired LAN.
True
2
Searching for unprotected wireless networks is called what?

A) WLAN trolling
B) war driving
C) battle testing
D) wireless fishing
B
3
____ ensures that the information is correct and that no unauthorized person or malicious software has altered it.

A) Integrity
B) Availability
C) Confidentiality
D) Access control
A
4
Which of the following is NOT an information security layer?

A) products
B) people
C) prevention
D) procedures
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
5
The process whereby an attacker can trick a corporate mobile device to connect to an impostor AP is referred to as which of the following?

A) inserting network traffic
B) denial of service
C) hijacking the wireless connection
D) reading data
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
6
A ____ attack on WEP involves identifying two packets derived from the same IV.

A) capture
B) keystream
C) weak key
D) pseudo-random number
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
7
With WEP,it is impossible for an attacker to identify two packets derived from the same initialization vector.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
8
What disadvantage of wireless networks provides the biggest stumbling block to the adoption of wireless technology?

A) availability
B) cost
C) security
D) complexity
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
9
WEP guards one of the CIA characteristics,namely what?

A) integrity
B) availability
C) confidentiality
D) access control
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
10
Cleartext that has been encrypted is referred to as which of the following?

A) plaintext
B) cryptography
C) ciphertext
D) keytext
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
11
Wireless security was implemented well in the original 802.11 standard.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
12
A user needs to enter the service set identifier manually when which weak security measure is employed?

A) WEP encryption
B) Open System Authentication
C) SSID hiding
D) shared key authentication
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
13
Open system authentication and shared key authentication are the two types of wireless authentication available under the 802.11 standard.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
14
Attacks that use many computers to attack a single network are called centralized attacks.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
15
Which type of access control is implemented by recording the physical address of a wireless client into software running on the AP?

A) NIC blocking
B) MAC address filtering
C) Network blocking
D) IP address filtering
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
16
A key that creates a detectable pattern is referred to as which of the following?

A) repeating key
B) plain key
C) weak key
D) crypto key
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
17
Which is true about WEP?

A) uses a shared secret key
B) uses a public/private key pair
C) two keys are maintained
D) must be at least 32 bits in length
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
18
A rogue AP can be described as which of the following?

A) an AP whose security settings have not been set
B) an AP designed to mimic an authorized AP
C) an AP that has malfunctioned and allows unauthorized users to access it
D) an unauthorized AP brought into the enterprise network
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
19
On wireless networks,____ attacks are commonly done by attackers setting up an evil twin.

A) spoof
B) weak key
C) DoS
D) man-in-the-middle
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
20
An attacker spoofs frames to prevent a client from remaining connected to the WLAN.What type of an attack is this?

A) RF jamming
B) man-in-the-middle
C) hijacking
D) denial of service
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
21
Which of the following are weaknesses of MAC address filtering? (Choose all that apply.)

A) only Windows uses MAC addresses,excluding other OSs from this method
B) MAC addresses can be spoofed
C) the MAC address can be captured by forcing a reassociation
D) MAC address management can be difficult
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
22
Briefly define cryptography.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
23
Describe one weakness of MAC address filtering.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
24
What is a distributed attack?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
25
Describe how an attacker can hijack a wireless connection.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
26
Describe the five steps in the process of WEP encryption.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
27
List and describe the three characteristics of information that must be protected by information security?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
28
The three protections that must be extended over information can be described by the acronym ________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
29
Describe three limitations of SSID hiding.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
30
How have WLANs changed 'hard edges' into 'blurred edges'?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
31
Which of the following are difficulties faced in defending attacks? (Choose all that apply.)

A) universally connected devices
B) operating system vendor's lack of concern about security
C) increased speed of attacks
D) attacks that are more complex
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
32
____________________ ensures that no unauthorized person or software has altered the information.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
33
Plaintext data is input into an encryption _________,which consists of procedures based on a mathematical formula used to encrypt the data.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
34
Which of the following are among the 802.11 cryptography objectives? (Choose all that apply.)

A) efficient
B) self-synchronizing
C) mandatory
D) exclusive
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
35
WEP protects _______________ by scrambling the wireless data as it is transmitted.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
36
Describe open system authentication.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
37
Wireless access control is intended to limit a user's admission to the _______.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
38
What three categories can the protections implemented in the original 802.11 standard be divided into? (Choose three.)

A) access control
B) MAC address filtering
C) wired equivalent privacy
D) authentication
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
39
Describe war driving.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
40
Match between columns
an imposter AP that is set up by an attacker
plaintext
an imposter AP that is set up by an attacker
man-in-the-middle
an imposter AP that is set up by an attacker
denial of service
an imposter AP that is set up by an attacker
weak keys
an imposter AP that is set up by an attacker
decryption
an imposter AP that is set up by an attacker
RF jamming
an imposter AP that is set up by an attacker
evil twin
an imposter AP that is set up by an attacker
ciphertext
an imposter AP that is set up by an attacker
keystream
an imposter AP that is set up by an attacker
access control
granting or denying approval to use specific resources
plaintext
granting or denying approval to use specific resources
man-in-the-middle
granting or denying approval to use specific resources
denial of service
granting or denying approval to use specific resources
weak keys
granting or denying approval to use specific resources
decryption
granting or denying approval to use specific resources
RF jamming
granting or denying approval to use specific resources
evil twin
granting or denying approval to use specific resources
ciphertext
granting or denying approval to use specific resources
keystream
granting or denying approval to use specific resources
access control
a DoS attack that floods the RF spectrum with extraneous RF signal "noise" that prevents communications from occurring
plaintext
a DoS attack that floods the RF spectrum with extraneous RF signal "noise" that prevents communications from occurring
man-in-the-middle
a DoS attack that floods the RF spectrum with extraneous RF signal "noise" that prevents communications from occurring
denial of service
a DoS attack that floods the RF spectrum with extraneous RF signal "noise" that prevents communications from occurring
weak keys
a DoS attack that floods the RF spectrum with extraneous RF signal "noise" that prevents communications from occurring
decryption
a DoS attack that floods the RF spectrum with extraneous RF signal "noise" that prevents communications from occurring
RF jamming
a DoS attack that floods the RF spectrum with extraneous RF signal "noise" that prevents communications from occurring
evil twin
a DoS attack that floods the RF spectrum with extraneous RF signal "noise" that prevents communications from occurring
ciphertext
a DoS attack that floods the RF spectrum with extraneous RF signal "noise" that prevents communications from occurring
keystream
a DoS attack that floods the RF spectrum with extraneous RF signal "noise" that prevents communications from occurring
access control
an attack that makes it appear that the wireless device and the network computers are communicating with each other
plaintext
an attack that makes it appear that the wireless device and the network computers are communicating with each other
man-in-the-middle
an attack that makes it appear that the wireless device and the network computers are communicating with each other
denial of service
an attack that makes it appear that the wireless device and the network computers are communicating with each other
weak keys
an attack that makes it appear that the wireless device and the network computers are communicating with each other
decryption
an attack that makes it appear that the wireless device and the network computers are communicating with each other
RF jamming
an attack that makes it appear that the wireless device and the network computers are communicating with each other
evil twin
an attack that makes it appear that the wireless device and the network computers are communicating with each other
ciphertext
an attack that makes it appear that the wireless device and the network computers are communicating with each other
keystream
an attack that makes it appear that the wireless device and the network computers are communicating with each other
access control
cryptographic keys that create a repeating pattern
plaintext
cryptographic keys that create a repeating pattern
man-in-the-middle
cryptographic keys that create a repeating pattern
denial of service
cryptographic keys that create a repeating pattern
weak keys
cryptographic keys that create a repeating pattern
decryption
cryptographic keys that create a repeating pattern
RF jamming
cryptographic keys that create a repeating pattern
evil twin
cryptographic keys that create a repeating pattern
ciphertext
cryptographic keys that create a repeating pattern
keystream
cryptographic keys that create a repeating pattern
access control
the output from a pseudo-random number generator (PRNG)
plaintext
the output from a pseudo-random number generator (PRNG)
man-in-the-middle
the output from a pseudo-random number generator (PRNG)
denial of service
the output from a pseudo-random number generator (PRNG)
weak keys
the output from a pseudo-random number generator (PRNG)
decryption
the output from a pseudo-random number generator (PRNG)
RF jamming
the output from a pseudo-random number generator (PRNG)
evil twin
the output from a pseudo-random number generator (PRNG)
ciphertext
the output from a pseudo-random number generator (PRNG)
keystream
the output from a pseudo-random number generator (PRNG)
access control
an attack that attempts to prevent a device from performing its normal functions
plaintext
an attack that attempts to prevent a device from performing its normal functions
man-in-the-middle
an attack that attempts to prevent a device from performing its normal functions
denial of service
an attack that attempts to prevent a device from performing its normal functions
weak keys
an attack that attempts to prevent a device from performing its normal functions
decryption
an attack that attempts to prevent a device from performing its normal functions
RF jamming
an attack that attempts to prevent a device from performing its normal functions
evil twin
an attack that attempts to prevent a device from performing its normal functions
ciphertext
an attack that attempts to prevent a device from performing its normal functions
keystream
an attack that attempts to prevent a device from performing its normal functions
access control
data input into an encryption algorithm
plaintext
data input into an encryption algorithm
man-in-the-middle
data input into an encryption algorithm
denial of service
data input into an encryption algorithm
weak keys
data input into an encryption algorithm
decryption
data input into an encryption algorithm
RF jamming
data input into an encryption algorithm
evil twin
data input into an encryption algorithm
ciphertext
data input into an encryption algorithm
keystream
data input into an encryption algorithm
access control
the process of changing ciphertext into plaintext
plaintext
the process of changing ciphertext into plaintext
man-in-the-middle
the process of changing ciphertext into plaintext
denial of service
the process of changing ciphertext into plaintext
weak keys
the process of changing ciphertext into plaintext
decryption
the process of changing ciphertext into plaintext
RF jamming
the process of changing ciphertext into plaintext
evil twin
the process of changing ciphertext into plaintext
ciphertext
the process of changing ciphertext into plaintext
keystream
the process of changing ciphertext into plaintext
access control
data that has been encrypted
plaintext
data that has been encrypted
man-in-the-middle
data that has been encrypted
denial of service
data that has been encrypted
weak keys
data that has been encrypted
decryption
data that has been encrypted
RF jamming
data that has been encrypted
evil twin
data that has been encrypted
ciphertext
data that has been encrypted
keystream
data that has been encrypted
access control
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 40 في هذه المجموعة.