Chapter 8 Key Terms Flashcards

1
Q

Service set identifier

A

A unique name that identifies a wireless network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Wireless access point (WAP)

A

A wireless access point broadcasts information and data over radio waves.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Wireless interface

A

The interface in a device, such as a laptop or smart phone, that connects to the wireless access point.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Rogue Access Points

A

Any unauthorized access point added to a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Initialization vector (IV)

A

A seed value used in encryption. The seed value and the key are used in an encryption algorithm to generate additional keys or encrypt data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Radio frequency identification

A

RFID uses radio waves to transmit data from small circuit boards called RFID tags to special scanners.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Near Field Communication (NFC)

A

NFC allows two-way communication between two devices. The devices must be within a few centimeters of each other. NFC is a newer technology that is built on RFID.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Interference

A

A signal that corrupts or destroys a wireless signal. Interference can affect communication of access points and other wireless devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Wi-Fi Protected Access (WPA)

A

The most commonly used cryptographic protocol in use for wireless networks. WPA2 and WPA3 are the two versions in use.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Pre-shared key

A

Wireless access method that utilizes a passphrase for users to connect.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Wi-Fi Protected Setup (WPS)

A

Wireless access method that allows a device to securely connect to a wireless network without typing the PSK.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Open network

A

Wireless access method that has no authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Captive portal

A

Wireless access method that forces a user to view and interact with it before accessing a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

802.1x

A

Standard for local area networks that is used to authenticate users to a wireless network. It was created by The Institute of Electrical and Electronics Engineers Standards Association.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Remote Authentication Dial-In User Service

A

A protocol used to authenticate users in a enterprise environment to a wireless network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Extensible Authentication Protocol (EAP)

A

An authentication framework that uses a set of interface standards. EAP allows various authentication methods to be used.