Matching
Match each item with an statement below:
Premises:
most basic method for identifying and locating a rogue access point.
simplest wireless device discovery method.
device that can monitor the airwaves for traffic.
attempts to uncover and prevent an attack before it harms the WLAN.
gives limited privacy protections against the sale of private financial information and obtaining personal information through false pretenses.
standard network management protocol for wired networks.
designed to exclusively monitor the RF frequency for transmissions.
designed to stop an attack from occurring.
false attack alerts.
Responses:
Intrusion prevention system
Wireless intrusion prevention system (WIPS)
Gramm-Leach-Bliley Act (GLBA)
Nearest sensor
SNMP
False positives
Dedicated probe
Mobile sniffing audit
Wireless probe
Correct Answer:
Premises:
Responses:
most basic method for identifying and locating a rogue access point.
simplest wireless device discovery method.
device that can monitor the airwaves for traffic.
attempts to uncover and prevent an attack before it harms the WLAN.
gives limited privacy protections against the sale of private financial information and obtaining personal information through false pretenses.
standard network management protocol for wired networks.
designed to exclusively monitor the RF frequency for transmissions.
designed to stop an attack from occurring.
false attack alerts.
Premises:
most basic method for identifying and locating a rogue access point.
simplest wireless device discovery method.
device that can monitor the airwaves for traffic.
attempts to uncover and prevent an attack before it harms the WLAN.
gives limited privacy protections against the sale of private financial information and obtaining personal information through false pretenses.
standard network management protocol for wired networks.
designed to exclusively monitor the RF frequency for transmissions.
designed to stop an attack from occurring.
false attack alerts.
Responses:
Related Questions
Q30: Briefly describe how SNMP works.
Q32: An SNMP _ acknowledges the message with
Q34: _ measures the angles between three or
Q35: The _ governs the privacy of personal
Q36: A(n) _ is a security management system
Q37: What are the steps to perform a
Q38: _ measures the distance between three or
Q39: What is the problem with rogue access
Q40: What are the disadvantages of using a
Q41: Compare an intrusion system with a firewall.
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents