Matching
Match each term with the correct statement below.
Premises:
a device in an IEEE 802.1X network that accepts or rejects a supplicant
an encryption cipher that takes one character and replaces it with another character
providing access based on a user's job function within an organization
dynamically generating a new key for each packet to preventing collisions
a method for auditing usage by using an algorithm to determine if a threat exists
device in an IEEE 802.1X network that makes an appeal for access
using wireless technologies for asset tracking of wireless equipment
an encrypted alternative to the Telnet protocol that is used to access remote computers
a standard originally developed for wired networks that blocks all traffic on a port-by-port basis until the client is authenticated
a security management system that constantly monitors the RF for attacks and sounds an alert if one is detected
Responses:
supplicant
real-time location services
secure shell
802.1X
Role-Based Access Control
per-packet key
stream cipher
wireless intrusion detection system
heuristic monitoring
authenticator
Correct Answer:
Premises:
Responses:
a device in an IEEE 802.1X network that accepts or rejects a supplicant
an encryption cipher that takes one character and replaces it with another character
providing access based on a user's job function within an organization
dynamically generating a new key for each packet to preventing collisions
a method for auditing usage by using an algorithm to determine if a threat exists
device in an IEEE 802.1X network that makes an appeal for access
using wireless technologies for asset tracking of wireless equipment
an encrypted alternative to the Telnet protocol that is used to access remote computers
a standard originally developed for wired networks that blocks all traffic on a port-by-port basis until the client is authenticated
a security management system that constantly monitors the RF for attacks and sounds an alert if one is detected
Premises:
a device in an IEEE 802.1X network that accepts or rejects a supplicant
an encryption cipher that takes one character and replaces it with another character
providing access based on a user's job function within an organization
dynamically generating a new key for each packet to preventing collisions
a method for auditing usage by using an algorithm to determine if a threat exists
device in an IEEE 802.1X network that makes an appeal for access
using wireless technologies for asset tracking of wireless equipment
an encrypted alternative to the Telnet protocol that is used to access remote computers
a standard originally developed for wired networks that blocks all traffic on a port-by-port basis until the client is authenticated
a security management system that constantly monitors the RF for attacks and sounds an alert if one is detected
Responses:
Related Questions
Q30: What are the three major components in
Q31: Temporal Key Integrity Protocol (TKIP)has three major
Q32: Describe a block cipher.
Q33: WPA _ was designed for individuals or
Q34: _ WEP solves the weak IV problem
Q35: Which WEP weaknesses were identified by universities
Q36: What are the four types of of
Q37: Used in WEP2,_ was developed by the
Q38: Describe pre-shared key authentication.
Q39: Authentication for WPA Personal is accomplished using
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents