Chapter 5 Flashcards

1
Q

There are two major types of wireless networks that are popular today among users. These networks are Wi-Fi and ____.

A

Bluetooth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

In the field of computer networking and wireless communications, the most widely known and influential organization is the ____.

A

IEEE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

IEEE ____ combines the best features of 802.11b and 802.11a and is still used today.

A

802.11gab

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

War driving is derived from the term ____.

A

War Dailing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Bluetooth’s rate of transmission is ____ Mbps.

A

1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

____ is an attack that sends unsolicited messages to Bluetooth-enabled devices.

A

bluejacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

____ is an attack that accesses unauthorized information from a wireless device through a Bluetooth connection, often between cell phones and laptop computers.

A

bluesnarfing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Because of a security weakness it is important that key values exceed ____ at least characters in length.

A

20

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

As a means of simplifying turning on WPA2 Personal, many devices now support ____ as an optional means of configuring security

A

WI-FI PROTECTED (WPS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The ____ in a Wi-Fi network serves as the network name identifier.

A

SSID

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A(n) ____ address is a unique hardware number that is “burned in” to each wireless network interface card adapter.

A

MAC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Many attackers create a direct ____ network, a peer-to-peer network that connects a wireless device directly to another wireless device, such as the victim’s laptop directly to the attacker’s laptop.

A

AD HOC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A(n) ____ uses an unsecured public network, such as the Internet, as if it were a secure private network.

A

Virtual private network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

____ cryptography uses two keys.

A

Asymetric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Most encryption for data stored on a laptop uses ____ cryptography.

A

Private Key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

____ cryptography uses same single key to encrypt and decrypt a document.

A

Private Key

17
Q

Private key cryptography is also called ____ cryptography.

18
Q

A(n) ____ is a method used by operating systems to store, retrieve, and organize files.

A

File System

19
Q

Cryptography can also be applied to entire disks. This is known as ____ encryption and protects all data on a hard drive.

A

Whole Disk

20
Q

On tablets and smartphones, users should enable ____, which password-protects the device when it has not been used for a set period of time

21
Q

On tablets and smartphones, it is recommended to download and install a(n) ____ app that can erase the contents of the device if lost or stolen

A

Remote Wipe

22
Q

provides the optimum level of wireless security and has been mandatory for all certified wireless devices manufactured since March 2006.

23
Q

a traditional cellular telephone that includes a limited number of features.

A

Feature Phone

24
Q

used to send and receive wireless signals

A

Wireless Adapter

25
short-range wireless technology designed for interconnecting computers and peripherals, handheld devices, and cell phones.
Bluetooth
26
searching for wireless signals from an automobile or on foot using a portable computing device.
War Driving
27
a radical technology or innovation that fills a new role that an existing device or technology could not.
Disruptive Tech
28
an AP or another computer that is set up by an attacker designed to mimic an authorized Wi-Fi device.
Evil Twin
29
most widely used type of wireless network.
802.11n
30
portable computing devices with screen sizes ranging from 5 to 10 inches (127 to 254 millimeters)
Tablet Computers