Chapter 5 Flashcards
There are two major types of wireless networks that are popular today among users. These networks are Wi-Fi and ____.
Bluetooth
In the field of computer networking and wireless communications, the most widely known and influential organization is the ____.
IEEE
IEEE ____ combines the best features of 802.11b and 802.11a and is still used today.
802.11gab
War driving is derived from the term ____.
War Dailing
Bluetooth’s rate of transmission is ____ Mbps.
1
____ is an attack that sends unsolicited messages to Bluetooth-enabled devices.
bluejacking
____ is an attack that accesses unauthorized information from a wireless device through a Bluetooth connection, often between cell phones and laptop computers.
bluesnarfing
Because of a security weakness it is important that key values exceed ____ at least characters in length.
20
As a means of simplifying turning on WPA2 Personal, many devices now support ____ as an optional means of configuring security
WI-FI PROTECTED (WPS)
The ____ in a Wi-Fi network serves as the network name identifier.
SSID
A(n) ____ address is a unique hardware number that is “burned in” to each wireless network interface card adapter.
MAC
Many attackers create a direct ____ network, a peer-to-peer network that connects a wireless device directly to another wireless device, such as the victim’s laptop directly to the attacker’s laptop.
AD HOC
A(n) ____ uses an unsecured public network, such as the Internet, as if it were a secure private network.
Virtual private network
____ cryptography uses two keys.
Asymetric
Most encryption for data stored on a laptop uses ____ cryptography.
Private Key
____ cryptography uses same single key to encrypt and decrypt a document.
Private Key
Private key cryptography is also called ____ cryptography.
Symmetric
A(n) ____ is a method used by operating systems to store, retrieve, and organize files.
File System
Cryptography can also be applied to entire disks. This is known as ____ encryption and protects all data on a hard drive.
Whole Disk
On tablets and smartphones, users should enable ____, which password-protects the device when it has not been used for a set period of time
AutoLock
On tablets and smartphones, it is recommended to download and install a(n) ____ app that can erase the contents of the device if lost or stolen
Remote Wipe
provides the optimum level of wireless security and has been mandatory for all certified wireless devices manufactured since March 2006.
WPA 2
a traditional cellular telephone that includes a limited number of features.
Feature Phone
used to send and receive wireless signals
Wireless Adapter