Chapter 5 Flashcards

1
Q

There are two major types of wireless networks that are popular today among users. These networks are Wi-Fi and ____.

A

Bluetooth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

In the field of computer networking and wireless communications, the most widely known and influential organization is the ____.

A

IEEE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

IEEE ____ combines the best features of 802.11b and 802.11a and is still used today.

A

802.11gab

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

War driving is derived from the term ____.

A

War Dailing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Bluetooth’s rate of transmission is ____ Mbps.

A

1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

____ is an attack that sends unsolicited messages to Bluetooth-enabled devices.

A

bluejacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

____ is an attack that accesses unauthorized information from a wireless device through a Bluetooth connection, often between cell phones and laptop computers.

A

bluesnarfing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Because of a security weakness it is important that key values exceed ____ at least characters in length.

A

20

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

As a means of simplifying turning on WPA2 Personal, many devices now support ____ as an optional means of configuring security

A

WI-FI PROTECTED (WPS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The ____ in a Wi-Fi network serves as the network name identifier.

A

SSID

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A(n) ____ address is a unique hardware number that is “burned in” to each wireless network interface card adapter.

A

MAC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Many attackers create a direct ____ network, a peer-to-peer network that connects a wireless device directly to another wireless device, such as the victim’s laptop directly to the attacker’s laptop.

A

AD HOC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A(n) ____ uses an unsecured public network, such as the Internet, as if it were a secure private network.

A

Virtual private network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

____ cryptography uses two keys.

A

Asymetric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Most encryption for data stored on a laptop uses ____ cryptography.

A

Private Key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

____ cryptography uses same single key to encrypt and decrypt a document.

A

Private Key

17
Q

Private key cryptography is also called ____ cryptography.

A

Symmetric

18
Q

A(n) ____ is a method used by operating systems to store, retrieve, and organize files.

A

File System

19
Q

Cryptography can also be applied to entire disks. This is known as ____ encryption and protects all data on a hard drive.

A

Whole Disk

20
Q

On tablets and smartphones, users should enable ____, which password-protects the device when it has not been used for a set period of time

A

AutoLock

21
Q

On tablets and smartphones, it is recommended to download and install a(n) ____ app that can erase the contents of the device if lost or stolen

A

Remote Wipe

22
Q

provides the optimum level of wireless security and has been mandatory for all certified wireless devices manufactured since March 2006.

A

WPA 2

23
Q

a traditional cellular telephone that includes a limited number of features.

A

Feature Phone

24
Q

used to send and receive wireless signals

A

Wireless Adapter

25
Q

short-range wireless technology designed for interconnecting computers and peripherals, handheld devices, and cell phones.

A

Bluetooth

26
Q

searching for wireless signals from an automobile or on foot using a portable computing device.

A

War Driving

27
Q

a radical technology or innovation that fills a new role that an existing device or technology could not.

A

Disruptive Tech

28
Q

an AP or another computer that is set up by an attacker designed to mimic an authorized Wi-Fi device.

A

Evil Twin

29
Q

most widely used type of wireless network.

A

802.11n

30
Q

portable computing devices with screen sizes ranging from 5 to 10 inches (127 to 254 millimeters)

A

Tablet Computers