Chapter 5 Flashcards
There are two major types of wireless networks that are popular today among users. These networks are Wi-Fi and ____.
Bluetooth
In the field of computer networking and wireless communications, the most widely known and influential organization is the ____.
IEEE
IEEE ____ combines the best features of 802.11b and 802.11a and is still used today.
802.11gab
War driving is derived from the term ____.
War Dailing
Bluetooth’s rate of transmission is ____ Mbps.
1
____ is an attack that sends unsolicited messages to Bluetooth-enabled devices.
bluejacking
____ is an attack that accesses unauthorized information from a wireless device through a Bluetooth connection, often between cell phones and laptop computers.
bluesnarfing
Because of a security weakness it is important that key values exceed ____ at least characters in length.
20
As a means of simplifying turning on WPA2 Personal, many devices now support ____ as an optional means of configuring security
WI-FI PROTECTED (WPS)
The ____ in a Wi-Fi network serves as the network name identifier.
SSID
A(n) ____ address is a unique hardware number that is “burned in” to each wireless network interface card adapter.
MAC
Many attackers create a direct ____ network, a peer-to-peer network that connects a wireless device directly to another wireless device, such as the victim’s laptop directly to the attacker’s laptop.
AD HOC
A(n) ____ uses an unsecured public network, such as the Internet, as if it were a secure private network.
Virtual private network
____ cryptography uses two keys.
Asymetric
Most encryption for data stored on a laptop uses ____ cryptography.
Private Key