Matching
Match each term with the correct statement below.
Premises:
an imposter AP that is set up by an attacker
granting or denying approval to use specific resources
a DoS attack that floods the RF spectrum with extraneous RF signal "noise" that prevents communications from occurring
an attack that makes it appear that the wireless device and the network computers are communicating with each other
cryptographic keys that create a repeating pattern
the output from a pseudo-random number generator (PRNG)
an attack that attempts to prevent a device from performing its normal functions
data input into an encryption algorithm
the process of changing ciphertext into plaintext
data that has been encrypted
Responses:
RF jamming
weak keys
keystream
man-in-the-middle
plaintext
evil twin
access control
denial of service
ciphertext
decryption
Correct Answer:
Premises:
Responses:
an imposter AP that is set up by an attacker
granting or denying approval to use specific resources
a DoS attack that floods the RF spectrum with extraneous RF signal "noise" that prevents communications from occurring
an attack that makes it appear that the wireless device and the network computers are communicating with each other
cryptographic keys that create a repeating pattern
the output from a pseudo-random number generator (PRNG)
an attack that attempts to prevent a device from performing its normal functions
data input into an encryption algorithm
the process of changing ciphertext into plaintext
data that has been encrypted
Premises:
an imposter AP that is set up by an attacker
granting or denying approval to use specific resources
a DoS attack that floods the RF spectrum with extraneous RF signal "noise" that prevents communications from occurring
an attack that makes it appear that the wireless device and the network computers are communicating with each other
cryptographic keys that create a repeating pattern
the output from a pseudo-random number generator (PRNG)
an attack that attempts to prevent a device from performing its normal functions
data input into an encryption algorithm
the process of changing ciphertext into plaintext
data that has been encrypted
Responses:
Related Questions
Q30: How have WLANs changed 'hard edges' into
Q31: Which of the following are difficulties faced
Q32: _ ensures that no unauthorized person or
Q33: Plaintext data is input into an encryption
Q34: Which of the following are among the
Q35: WEP protects _ by scrambling the wireless
Q36: Describe open system authentication.
Q37: Wireless access control is intended to limit
Q38: What three categories can the protections implemented
Q39: Describe war driving.
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents