Deck 10: Implementing Wireless LAN Security

Full screen (f)
exit full mode
Question
Amongst the most common transport encryption algorithms,used to securely transmit documents over the Internet is which of the following?

A) HTTP
B) SSL
C) SSH
D) SNMP
Use Space or
up arrow
down arrow
to flip the card.
Question
What authentication system did the proposed WEP2 standard use?

A) Kerberos
B) AES-CCMP
C) dynamic WEP
D) key caching
Question
Which type of WIDS/WIPS sensor uses dedicated sensors for scanning the RF for attacks?

A) integrated
B) overlay
C) AP
D) embedded
Question
Dictionary attacks are used to attack what aspect of WEP2?

A) encryption
B) initialization vector problems
C) pseudo-random number generator issues
D) authentication
Question
A ____ VPN is a user-to-LAN connection used by remote users.

A) remote-access
B) site-to-site
C) peer-to-peer
D) remote-to-LAN
Question
Which of the following is NOT a typical AP status tagged by a WIDS/WIPS system?

A) Unknown
B) Authorized
C) Monitored
D) Rogue
Question
WPA2 uses a block cipher rather than a stream cipher.
Question
A virtual private network (VPN)uses a public,unsecured network as if it were a private,secured network.
Question
Which was developed to help users who have little or no knowledge of security quickly and easily implement WPA2 on their WLANs?

A) VPN
B) TLS
C) IEEE 802.1x
D) WPS
Question
What does WPA include that is designed to prevent an attacker from conducting man-in-the-middle attacks?

A) cyclic redundancy check
B) preshared key
C) message integrity check
D) a temporal key
Question
WEP2 attempted to overcome the limitations of WEP by adding two new security enhancements.
Question
Which encryption protocol is used for 802.11i/WPA2?

A) RSN
B) CCMP
C) PSK
D) TKIP
Question
Which of the following is true about RADIUS?

A) messages are never sent from the wireless device to the RADIUS server
B) RADIUS clients,such as laptops,request authentication from a server
C) it is used by WPA personal as the preferred authentication method
D) it is primarily used in low-volume SOHO applications
Question
Signature-based monitoring can be described as which of the following?

A) attempts to answer the question: "will this do something harmful if allowed to execute?"
B) compiles a baseline of normal activities and looks for statistical anomalies
C) examines network traffic,activity,and transactions,and looks for well-known patterns
D) continuously analyzes the behavior of processes and alerts the user if abnormal actions are detected
Question
Due to the enhancements in WEP2,it was widely implemented and remains a popular security mechanism today.
Question
What does WPA use for authentication?

A) Kerberos
B) open system authentication
C) preshared key
D) certificates
Question
Which problem did dynamic WEP resolve?

A) man-in-the-middle attacks
B) weak IV problem
C) denial of service attacks
D) dictionary attacks
Question
Kerberos became the heart of the WPA security method.
Question
What was a design goal of WPA?

A) fit into the existing WEP engine
B) a long-term solution to WEP vulnerabilities
C) require users to replace wireless hardware to achieve better security
D) All of the above
Question
It is important that the entire RF spectrum be scanned for potential attacks,which means the channels on which frequencies should be scanned?

A) 11 GHz,54 GHz
B) 2.4 MHz,3.5 MHz
C) 2.4 GHz,5 GHz
D) 11 MHz,54 MHz
Question
Describe a dictionary attack.
Question
Which of the following are TKIP enhancement areas? (Choose all that apply.)

A)a 40-bit encryption key is manually entered on APs and devices.
B)the required key length is increased to 128 bits
C)the IV is enhanced to effectively eliminate collisions
D)different keys are used for different types of traffic
Question
A WIDS/WIPS that uses a(n)_________________ sensor uses existing APs to monitor the RF.
Question
What were three weaknesses in WEP identified by university studies?
Question
Which of the following are true about wireless security systems? (Choose all that apply.)

A)a method used by WIDS is anomaly-based monitoring
B)WIPS can prevent an attack while WIDS cannot
C)WIPS is dependent on signatures
D)passive WIDS can configure the firewall if an attack is detected
Question
Name and describe the two types of wireless intrusion systems.
Question
Briefly describe RADIUS and mention a strength of RADIUS.
Question
Describe the three areas of enhancement provided by TKIP.
Question
What is EAP?
Question
What are the three major components in TKIP that address security vulnerabilities? (Choose three.)

A)IV sequence
B)MIC
C)block cipher
D)TKIP key mixing
Question
Temporal Key Integrity Protocol (TKIP)has three major components to address vulnerabilities.List and describe them.
Question
Describe a block cipher.
Question
WPA ____________________ was designed for individuals or small office home office (SOHO)settings of generally 10 or fewer employees.
Question
________________ WEP solves the weak IV problem by rotating the keys frequently and uses different keys for different types of traffic.
Question
Which WEP weaknesses were identified by universities and other organizations? (Choose all that apply)

A)The RC4 PRNG is not properly implemented.
B)WEP didn't always encrypt the data.
C)Initialization vector keys are reused.
D)WEP does not prevent man-in-the-middle attacks.
Question
What are the four types of of packets used by EAP?
Question
Used in WEP2,____________________ was developed by the Massachusetts Institute of Technology (MIT)and used to verify the identity of network users.
Question
Describe pre-shared key authentication.
Question
Authentication for WPA Personal is accomplished using a ____________ key.
Question
Match between columns
a device in an IEEE 802.1X network that accepts or rejects a supplicant
secure shell
a device in an IEEE 802.1X network that accepts or rejects a supplicant
real-time location services
a device in an IEEE 802.1X network that accepts or rejects a supplicant
supplicant
a device in an IEEE 802.1X network that accepts or rejects a supplicant
heuristic monitoring
a device in an IEEE 802.1X network that accepts or rejects a supplicant
802.1X
a device in an IEEE 802.1X network that accepts or rejects a supplicant
wireless intrusion detection system
a device in an IEEE 802.1X network that accepts or rejects a supplicant
stream cipher
a device in an IEEE 802.1X network that accepts or rejects a supplicant
per-packet key
a device in an IEEE 802.1X network that accepts or rejects a supplicant
Role-Based Access Control
a device in an IEEE 802.1X network that accepts or rejects a supplicant
authenticator
an encryption cipher that takes one character and replaces it with another character
secure shell
an encryption cipher that takes one character and replaces it with another character
real-time location services
an encryption cipher that takes one character and replaces it with another character
supplicant
an encryption cipher that takes one character and replaces it with another character
heuristic monitoring
an encryption cipher that takes one character and replaces it with another character
802.1X
an encryption cipher that takes one character and replaces it with another character
wireless intrusion detection system
an encryption cipher that takes one character and replaces it with another character
stream cipher
an encryption cipher that takes one character and replaces it with another character
per-packet key
an encryption cipher that takes one character and replaces it with another character
Role-Based Access Control
an encryption cipher that takes one character and replaces it with another character
authenticator
providing access based on a user's job function within an organization
secure shell
providing access based on a user's job function within an organization
real-time location services
providing access based on a user's job function within an organization
supplicant
providing access based on a user's job function within an organization
heuristic monitoring
providing access based on a user's job function within an organization
802.1X
providing access based on a user's job function within an organization
wireless intrusion detection system
providing access based on a user's job function within an organization
stream cipher
providing access based on a user's job function within an organization
per-packet key
providing access based on a user's job function within an organization
Role-Based Access Control
providing access based on a user's job function within an organization
authenticator
dynamically generating a new key for each packet to preventing collisions
secure shell
dynamically generating a new key for each packet to preventing collisions
real-time location services
dynamically generating a new key for each packet to preventing collisions
supplicant
dynamically generating a new key for each packet to preventing collisions
heuristic monitoring
dynamically generating a new key for each packet to preventing collisions
802.1X
dynamically generating a new key for each packet to preventing collisions
wireless intrusion detection system
dynamically generating a new key for each packet to preventing collisions
stream cipher
dynamically generating a new key for each packet to preventing collisions
per-packet key
dynamically generating a new key for each packet to preventing collisions
Role-Based Access Control
dynamically generating a new key for each packet to preventing collisions
authenticator
a method for auditing usage by using an algorithm to determine if a threat exists
secure shell
a method for auditing usage by using an algorithm to determine if a threat exists
real-time location services
a method for auditing usage by using an algorithm to determine if a threat exists
supplicant
a method for auditing usage by using an algorithm to determine if a threat exists
heuristic monitoring
a method for auditing usage by using an algorithm to determine if a threat exists
802.1X
a method for auditing usage by using an algorithm to determine if a threat exists
wireless intrusion detection system
a method for auditing usage by using an algorithm to determine if a threat exists
stream cipher
a method for auditing usage by using an algorithm to determine if a threat exists
per-packet key
a method for auditing usage by using an algorithm to determine if a threat exists
Role-Based Access Control
a method for auditing usage by using an algorithm to determine if a threat exists
authenticator
device in an IEEE 802.1X network that makes an appeal for access
secure shell
device in an IEEE 802.1X network that makes an appeal for access
real-time location services
device in an IEEE 802.1X network that makes an appeal for access
supplicant
device in an IEEE 802.1X network that makes an appeal for access
heuristic monitoring
device in an IEEE 802.1X network that makes an appeal for access
802.1X
device in an IEEE 802.1X network that makes an appeal for access
wireless intrusion detection system
device in an IEEE 802.1X network that makes an appeal for access
stream cipher
device in an IEEE 802.1X network that makes an appeal for access
per-packet key
device in an IEEE 802.1X network that makes an appeal for access
Role-Based Access Control
device in an IEEE 802.1X network that makes an appeal for access
authenticator
using wireless technologies for asset tracking of wireless equipment
secure shell
using wireless technologies for asset tracking of wireless equipment
real-time location services
using wireless technologies for asset tracking of wireless equipment
supplicant
using wireless technologies for asset tracking of wireless equipment
heuristic monitoring
using wireless technologies for asset tracking of wireless equipment
802.1X
using wireless technologies for asset tracking of wireless equipment
wireless intrusion detection system
using wireless technologies for asset tracking of wireless equipment
stream cipher
using wireless technologies for asset tracking of wireless equipment
per-packet key
using wireless technologies for asset tracking of wireless equipment
Role-Based Access Control
using wireless technologies for asset tracking of wireless equipment
authenticator
an encrypted alternative to the Telnet protocol that is used to access remote computers
secure shell
an encrypted alternative to the Telnet protocol that is used to access remote computers
real-time location services
an encrypted alternative to the Telnet protocol that is used to access remote computers
supplicant
an encrypted alternative to the Telnet protocol that is used to access remote computers
heuristic monitoring
an encrypted alternative to the Telnet protocol that is used to access remote computers
802.1X
an encrypted alternative to the Telnet protocol that is used to access remote computers
wireless intrusion detection system
an encrypted alternative to the Telnet protocol that is used to access remote computers
stream cipher
an encrypted alternative to the Telnet protocol that is used to access remote computers
per-packet key
an encrypted alternative to the Telnet protocol that is used to access remote computers
Role-Based Access Control
an encrypted alternative to the Telnet protocol that is used to access remote computers
authenticator
a standard originally developed for wired networks that blocks all traffic on a port-by-port basis until the client is authenticated
secure shell
a standard originally developed for wired networks that blocks all traffic on a port-by-port basis until the client is authenticated
real-time location services
a standard originally developed for wired networks that blocks all traffic on a port-by-port basis until the client is authenticated
supplicant
a standard originally developed for wired networks that blocks all traffic on a port-by-port basis until the client is authenticated
heuristic monitoring
a standard originally developed for wired networks that blocks all traffic on a port-by-port basis until the client is authenticated
802.1X
a standard originally developed for wired networks that blocks all traffic on a port-by-port basis until the client is authenticated
wireless intrusion detection system
a standard originally developed for wired networks that blocks all traffic on a port-by-port basis until the client is authenticated
stream cipher
a standard originally developed for wired networks that blocks all traffic on a port-by-port basis until the client is authenticated
per-packet key
a standard originally developed for wired networks that blocks all traffic on a port-by-port basis until the client is authenticated
Role-Based Access Control
a standard originally developed for wired networks that blocks all traffic on a port-by-port basis until the client is authenticated
authenticator
a security management system that constantly monitors the RF for attacks and sounds an alert if one is detected
secure shell
a security management system that constantly monitors the RF for attacks and sounds an alert if one is detected
real-time location services
a security management system that constantly monitors the RF for attacks and sounds an alert if one is detected
supplicant
a security management system that constantly monitors the RF for attacks and sounds an alert if one is detected
heuristic monitoring
a security management system that constantly monitors the RF for attacks and sounds an alert if one is detected
802.1X
a security management system that constantly monitors the RF for attacks and sounds an alert if one is detected
wireless intrusion detection system
a security management system that constantly monitors the RF for attacks and sounds an alert if one is detected
stream cipher
a security management system that constantly monitors the RF for attacks and sounds an alert if one is detected
per-packet key
a security management system that constantly monitors the RF for attacks and sounds an alert if one is detected
Role-Based Access Control
a security management system that constantly monitors the RF for attacks and sounds an alert if one is detected
authenticator
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/40
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 10: Implementing Wireless LAN Security
1
Amongst the most common transport encryption algorithms,used to securely transmit documents over the Internet is which of the following?

A) HTTP
B) SSL
C) SSH
D) SNMP
B
2
What authentication system did the proposed WEP2 standard use?

A) Kerberos
B) AES-CCMP
C) dynamic WEP
D) key caching
A
3
Which type of WIDS/WIPS sensor uses dedicated sensors for scanning the RF for attacks?

A) integrated
B) overlay
C) AP
D) embedded
B
4
Dictionary attacks are used to attack what aspect of WEP2?

A) encryption
B) initialization vector problems
C) pseudo-random number generator issues
D) authentication
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
5
A ____ VPN is a user-to-LAN connection used by remote users.

A) remote-access
B) site-to-site
C) peer-to-peer
D) remote-to-LAN
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
6
Which of the following is NOT a typical AP status tagged by a WIDS/WIPS system?

A) Unknown
B) Authorized
C) Monitored
D) Rogue
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
7
WPA2 uses a block cipher rather than a stream cipher.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
8
A virtual private network (VPN)uses a public,unsecured network as if it were a private,secured network.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
9
Which was developed to help users who have little or no knowledge of security quickly and easily implement WPA2 on their WLANs?

A) VPN
B) TLS
C) IEEE 802.1x
D) WPS
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
10
What does WPA include that is designed to prevent an attacker from conducting man-in-the-middle attacks?

A) cyclic redundancy check
B) preshared key
C) message integrity check
D) a temporal key
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
11
WEP2 attempted to overcome the limitations of WEP by adding two new security enhancements.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
12
Which encryption protocol is used for 802.11i/WPA2?

A) RSN
B) CCMP
C) PSK
D) TKIP
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
13
Which of the following is true about RADIUS?

A) messages are never sent from the wireless device to the RADIUS server
B) RADIUS clients,such as laptops,request authentication from a server
C) it is used by WPA personal as the preferred authentication method
D) it is primarily used in low-volume SOHO applications
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
14
Signature-based monitoring can be described as which of the following?

A) attempts to answer the question: "will this do something harmful if allowed to execute?"
B) compiles a baseline of normal activities and looks for statistical anomalies
C) examines network traffic,activity,and transactions,and looks for well-known patterns
D) continuously analyzes the behavior of processes and alerts the user if abnormal actions are detected
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
15
Due to the enhancements in WEP2,it was widely implemented and remains a popular security mechanism today.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
16
What does WPA use for authentication?

A) Kerberos
B) open system authentication
C) preshared key
D) certificates
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
17
Which problem did dynamic WEP resolve?

A) man-in-the-middle attacks
B) weak IV problem
C) denial of service attacks
D) dictionary attacks
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
18
Kerberos became the heart of the WPA security method.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
19
What was a design goal of WPA?

A) fit into the existing WEP engine
B) a long-term solution to WEP vulnerabilities
C) require users to replace wireless hardware to achieve better security
D) All of the above
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
20
It is important that the entire RF spectrum be scanned for potential attacks,which means the channels on which frequencies should be scanned?

A) 11 GHz,54 GHz
B) 2.4 MHz,3.5 MHz
C) 2.4 GHz,5 GHz
D) 11 MHz,54 MHz
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
21
Describe a dictionary attack.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
22
Which of the following are TKIP enhancement areas? (Choose all that apply.)

A)a 40-bit encryption key is manually entered on APs and devices.
B)the required key length is increased to 128 bits
C)the IV is enhanced to effectively eliminate collisions
D)different keys are used for different types of traffic
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
23
A WIDS/WIPS that uses a(n)_________________ sensor uses existing APs to monitor the RF.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
24
What were three weaknesses in WEP identified by university studies?
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
25
Which of the following are true about wireless security systems? (Choose all that apply.)

A)a method used by WIDS is anomaly-based monitoring
B)WIPS can prevent an attack while WIDS cannot
C)WIPS is dependent on signatures
D)passive WIDS can configure the firewall if an attack is detected
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
26
Name and describe the two types of wireless intrusion systems.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
27
Briefly describe RADIUS and mention a strength of RADIUS.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
28
Describe the three areas of enhancement provided by TKIP.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
29
What is EAP?
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
30
What are the three major components in TKIP that address security vulnerabilities? (Choose three.)

A)IV sequence
B)MIC
C)block cipher
D)TKIP key mixing
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
31
Temporal Key Integrity Protocol (TKIP)has three major components to address vulnerabilities.List and describe them.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
32
Describe a block cipher.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
33
WPA ____________________ was designed for individuals or small office home office (SOHO)settings of generally 10 or fewer employees.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
34
________________ WEP solves the weak IV problem by rotating the keys frequently and uses different keys for different types of traffic.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
35
Which WEP weaknesses were identified by universities and other organizations? (Choose all that apply)

A)The RC4 PRNG is not properly implemented.
B)WEP didn't always encrypt the data.
C)Initialization vector keys are reused.
D)WEP does not prevent man-in-the-middle attacks.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
36
What are the four types of of packets used by EAP?
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
37
Used in WEP2,____________________ was developed by the Massachusetts Institute of Technology (MIT)and used to verify the identity of network users.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
38
Describe pre-shared key authentication.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
39
Authentication for WPA Personal is accomplished using a ____________ key.
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
40
Match between columns
a device in an IEEE 802.1X network that accepts or rejects a supplicant
secure shell
a device in an IEEE 802.1X network that accepts or rejects a supplicant
real-time location services
a device in an IEEE 802.1X network that accepts or rejects a supplicant
supplicant
a device in an IEEE 802.1X network that accepts or rejects a supplicant
heuristic monitoring
a device in an IEEE 802.1X network that accepts or rejects a supplicant
802.1X
a device in an IEEE 802.1X network that accepts or rejects a supplicant
wireless intrusion detection system
a device in an IEEE 802.1X network that accepts or rejects a supplicant
stream cipher
a device in an IEEE 802.1X network that accepts or rejects a supplicant
per-packet key
a device in an IEEE 802.1X network that accepts or rejects a supplicant
Role-Based Access Control
a device in an IEEE 802.1X network that accepts or rejects a supplicant
authenticator
an encryption cipher that takes one character and replaces it with another character
secure shell
an encryption cipher that takes one character and replaces it with another character
real-time location services
an encryption cipher that takes one character and replaces it with another character
supplicant
an encryption cipher that takes one character and replaces it with another character
heuristic monitoring
an encryption cipher that takes one character and replaces it with another character
802.1X
an encryption cipher that takes one character and replaces it with another character
wireless intrusion detection system
an encryption cipher that takes one character and replaces it with another character
stream cipher
an encryption cipher that takes one character and replaces it with another character
per-packet key
an encryption cipher that takes one character and replaces it with another character
Role-Based Access Control
an encryption cipher that takes one character and replaces it with another character
authenticator
providing access based on a user's job function within an organization
secure shell
providing access based on a user's job function within an organization
real-time location services
providing access based on a user's job function within an organization
supplicant
providing access based on a user's job function within an organization
heuristic monitoring
providing access based on a user's job function within an organization
802.1X
providing access based on a user's job function within an organization
wireless intrusion detection system
providing access based on a user's job function within an organization
stream cipher
providing access based on a user's job function within an organization
per-packet key
providing access based on a user's job function within an organization
Role-Based Access Control
providing access based on a user's job function within an organization
authenticator
dynamically generating a new key for each packet to preventing collisions
secure shell
dynamically generating a new key for each packet to preventing collisions
real-time location services
dynamically generating a new key for each packet to preventing collisions
supplicant
dynamically generating a new key for each packet to preventing collisions
heuristic monitoring
dynamically generating a new key for each packet to preventing collisions
802.1X
dynamically generating a new key for each packet to preventing collisions
wireless intrusion detection system
dynamically generating a new key for each packet to preventing collisions
stream cipher
dynamically generating a new key for each packet to preventing collisions
per-packet key
dynamically generating a new key for each packet to preventing collisions
Role-Based Access Control
dynamically generating a new key for each packet to preventing collisions
authenticator
a method for auditing usage by using an algorithm to determine if a threat exists
secure shell
a method for auditing usage by using an algorithm to determine if a threat exists
real-time location services
a method for auditing usage by using an algorithm to determine if a threat exists
supplicant
a method for auditing usage by using an algorithm to determine if a threat exists
heuristic monitoring
a method for auditing usage by using an algorithm to determine if a threat exists
802.1X
a method for auditing usage by using an algorithm to determine if a threat exists
wireless intrusion detection system
a method for auditing usage by using an algorithm to determine if a threat exists
stream cipher
a method for auditing usage by using an algorithm to determine if a threat exists
per-packet key
a method for auditing usage by using an algorithm to determine if a threat exists
Role-Based Access Control
a method for auditing usage by using an algorithm to determine if a threat exists
authenticator
device in an IEEE 802.1X network that makes an appeal for access
secure shell
device in an IEEE 802.1X network that makes an appeal for access
real-time location services
device in an IEEE 802.1X network that makes an appeal for access
supplicant
device in an IEEE 802.1X network that makes an appeal for access
heuristic monitoring
device in an IEEE 802.1X network that makes an appeal for access
802.1X
device in an IEEE 802.1X network that makes an appeal for access
wireless intrusion detection system
device in an IEEE 802.1X network that makes an appeal for access
stream cipher
device in an IEEE 802.1X network that makes an appeal for access
per-packet key
device in an IEEE 802.1X network that makes an appeal for access
Role-Based Access Control
device in an IEEE 802.1X network that makes an appeal for access
authenticator
using wireless technologies for asset tracking of wireless equipment
secure shell
using wireless technologies for asset tracking of wireless equipment
real-time location services
using wireless technologies for asset tracking of wireless equipment
supplicant
using wireless technologies for asset tracking of wireless equipment
heuristic monitoring
using wireless technologies for asset tracking of wireless equipment
802.1X
using wireless technologies for asset tracking of wireless equipment
wireless intrusion detection system
using wireless technologies for asset tracking of wireless equipment
stream cipher
using wireless technologies for asset tracking of wireless equipment
per-packet key
using wireless technologies for asset tracking of wireless equipment
Role-Based Access Control
using wireless technologies for asset tracking of wireless equipment
authenticator
an encrypted alternative to the Telnet protocol that is used to access remote computers
secure shell
an encrypted alternative to the Telnet protocol that is used to access remote computers
real-time location services
an encrypted alternative to the Telnet protocol that is used to access remote computers
supplicant
an encrypted alternative to the Telnet protocol that is used to access remote computers
heuristic monitoring
an encrypted alternative to the Telnet protocol that is used to access remote computers
802.1X
an encrypted alternative to the Telnet protocol that is used to access remote computers
wireless intrusion detection system
an encrypted alternative to the Telnet protocol that is used to access remote computers
stream cipher
an encrypted alternative to the Telnet protocol that is used to access remote computers
per-packet key
an encrypted alternative to the Telnet protocol that is used to access remote computers
Role-Based Access Control
an encrypted alternative to the Telnet protocol that is used to access remote computers
authenticator
a standard originally developed for wired networks that blocks all traffic on a port-by-port basis until the client is authenticated
secure shell
a standard originally developed for wired networks that blocks all traffic on a port-by-port basis until the client is authenticated
real-time location services
a standard originally developed for wired networks that blocks all traffic on a port-by-port basis until the client is authenticated
supplicant
a standard originally developed for wired networks that blocks all traffic on a port-by-port basis until the client is authenticated
heuristic monitoring
a standard originally developed for wired networks that blocks all traffic on a port-by-port basis until the client is authenticated
802.1X
a standard originally developed for wired networks that blocks all traffic on a port-by-port basis until the client is authenticated
wireless intrusion detection system
a standard originally developed for wired networks that blocks all traffic on a port-by-port basis until the client is authenticated
stream cipher
a standard originally developed for wired networks that blocks all traffic on a port-by-port basis until the client is authenticated
per-packet key
a standard originally developed for wired networks that blocks all traffic on a port-by-port basis until the client is authenticated
Role-Based Access Control
a standard originally developed for wired networks that blocks all traffic on a port-by-port basis until the client is authenticated
authenticator
a security management system that constantly monitors the RF for attacks and sounds an alert if one is detected
secure shell
a security management system that constantly monitors the RF for attacks and sounds an alert if one is detected
real-time location services
a security management system that constantly monitors the RF for attacks and sounds an alert if one is detected
supplicant
a security management system that constantly monitors the RF for attacks and sounds an alert if one is detected
heuristic monitoring
a security management system that constantly monitors the RF for attacks and sounds an alert if one is detected
802.1X
a security management system that constantly monitors the RF for attacks and sounds an alert if one is detected
wireless intrusion detection system
a security management system that constantly monitors the RF for attacks and sounds an alert if one is detected
stream cipher
a security management system that constantly monitors the RF for attacks and sounds an alert if one is detected
per-packet key
a security management system that constantly monitors the RF for attacks and sounds an alert if one is detected
Role-Based Access Control
a security management system that constantly monitors the RF for attacks and sounds an alert if one is detected
authenticator
Unlock Deck
Unlock for access to all 40 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 40 flashcards in this deck.