Definitions Flashcards

1
Q

DHCP

A

The Dynamic Host Configuration Protocol is a network management protocol used on Internet Protocol networks for automatically assigning IP addresses and other communication parameters to devices connected to the network using a client–server architecture.

67 68

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

DNS

A

Domain Name System (DNS) An Application-layer protocol that resolves computer and domain names to their IP addresses; it uses UDP port 53.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

WAP

A

access point (AP) A wireless device that serves as the central connection point of a wireless LAN and mediates communication between wireless computers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

ad hoc mode

A

ad hoc mode Sometimes called “peer-to-peer mode,” it’s a wireless mode of operation typically used only in small or temporary installations. There’s no central device, and data travels from one device to another to reach the destination device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Address Resolution Protocol (ARP)

A

An Internetwork-layer protocol used to resolve a host’s IP address to its MAC address. ARP uses a broadcast frame containing the target host’s IP address, and the host that’s assigned the address responds with its MAC address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Authentication

A

The process of identifying who has access to the network. The most common form of authentication is a logon with a username and password.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Authorization

A

The process of granting or denying an authenticated user’s access to network resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Baseband

A

A type of signaling used in networks in which each bit of data is represented by a pulse of electricity (on copper media) or light (on fiber-optic media). These signals are sent at a single fixed frequency, using the medium’s entire bandwidth. LAN technologies use baseband signaling.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Basic input/output system (BIOS)

A

The firmware found on many PCs that is executed when the computer is powered on. Its primary task is to tell the CPU to perform certain tasks when power is
first applied to the computer, including initializing motherboard hardware, performing a power-on self-test (POST), and beginning the boot procedure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Broadband

A

A type of signaling that uses analog techniques to encode binary 1s and 0s across a continuous range of values. Broadband signals move across the medium in the form of continuous electromagnetic or optical waves rather than discrete pulses. Signals flow at a particular frequency, and each frequency represents a channel of data, allowing multiple streams of data on a single wire. TV and cable Internet use broadband signaling.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Broadcast domain

A

The scope of devices to which broadcast frames are forwarded. Router interfaces delimit broadcast domains because they don’t forward broadcasts, whereas switches and hubs do.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Bus

A

A collection of wires that carry data from one place to another on a computer’s motherboard.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Byte

A

A collection of 8 bits that might represent a number or a printable character.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Carrier Sense Multiple Access with Collision Detection (CSMA/CD)

A

A media access method in which a device must first listen (carrier sense) to the medium to be sure no other device is transmitting. If two devices transmit at the same time (multiple access), a collision occurs and is detected (collision detection). In this case, all devices involved in the collision wait for a random period of time before transmitting again.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Clear to send (CTS)

A

A signal an AP generates in response to a request-to-send signal. A CTS signal indicates that the computer that sent an RTS can transmit data. See also access point (AP) and request to send (RTS).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Client

A

The term used to describe an OS designed mainly to access network resources, a computer’s primary role in a network (running user applications and accessing network resources), and software that requests network resources from servers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Client-to-site VPN

A

mode A VPN mode that establishes a VPN connection between a single client computer and a VPN device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Cloud computing

A

A networking model in which data, applications, and processing power are managed by servers on the Internet, and users of these resources pay for what they use rather than the equipment and software needed to provide resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Cloud storage

A

A data storage method in which some or all of an organization’s data is stored on servers located offsite and maintained by a storage hosting company.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Collision

A

The result of two or more devices on the same medium transmitting simultaneously when CSMA/CD is the media access method in use. See also Carrier Sense Multiple Access with Collision Detection (CSMA/CD).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Collision domain

A

The extent to which signals in an Ethernet bus topology network are propagated. All devices connected to a logical bus topology network are in the same collision domain. Switch and router ports delimit collision domains.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Data Link layer

A

Layer 2 in the OSI model is responsible for managing access to the network medium and delivery of data frames from sender to receiver or from sender to an intermediate device, such as a router. See also Open Systems Interconnection (OSI) reference model.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Dedicated bandwidth

A

A property of switches in which each port’s bandwidth is dedicated to the devices connected to the port.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Datagram

A

The unit of information used by UDP in the Transport layer. A datagram is passed up to the Application layer as data and passed down to the Internetwork layer, where it becomes a packet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Deencapsulation

A

The process of stripping the header from a PDU as it makes its way up the communication layers before being passed to the next higher layer. See also protocol data unit (PDU).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Default gateway

A

The address configured in a computer’s IP address settings specifying the address of a router to which the computer can send packets addressed to devices on other networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Denial-of-service (DoS) attack

A

An attempt
to tie up network bandwidth or services so that network resources are rendered useless to legitimate users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Disk striping with parity

A

A fault-tolerant disk configuration in which parts of several physical disks are linked in an array, and data and parity information are written to all disks in this array. If one disk fails, data can be reconstructed from the parity information written on the others.

  • RAID 5 – Striping + Parity:
  • RAID 6 – Striping with double parity
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Distributed denial-of-service (DDoS) attacks

A

Attacks that use many systems to tie up network bandwidth or services so that network resources are rendered useless to legitimate users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Dynamic disk

A

A disk configuration in Windows that can be divided into one or more volumes. You can create up to 1000 volumes per dynamic disk (although no more than 32 are recommended). A dynamic disk offers features that a basic disk doesn’t, namely RAID and disk spanning.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Dynamic Host Configuration Protocol (DHCP)

A

An Application-layer protocol used to configure a host’s IP address settings dynamically; it uses UDP ports 67 and 68.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Encapsulation

A

The process of adding header and trailer information to chunks of data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Encryption

A

A technology that makes data unusable and unreadable to anyone except authorized users of the data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Extended star topology

A

An extension of the physical star topology, in which a central switch or hub is the central connecting point for other switches or hubs that have computers and other network devices attached, forming a star of stars.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Fiber-optic cable

A

A cable type that carries data over thin strands of glass by using optical (light) pulses to represent bits.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

File system

A

The method by which an OS stores, organizes, and manages access to files on a storage device, such as a hard drive.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

File Transfer Protocol (FTP)

A

An Application-layer protocol used to transfer and manage files across a network; FTP uses TCP ports 20 and 21.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Firewall

A

A hardware device or software program that inspects packets going into or out of a network or computer and then discards or forwards packets based on a set of rules.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Flood

A

The process whereby a switch forwards a frame out all connected ports.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Flow control

A

A mechanism network protocols
use to prevent a destination device from becoming overwhelmed by data from a transmitting computer, resulting in dropped packets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Frame

A

A packet with source and destination MAC addresses added and an error-checking code added to the back end. Frames are generated and processed by the network interface. See also packet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Full-duplex mode

A

A communication mode in which a device can simultaneously transmit and receive data on the same cable connection. Switches can operate in full-duplex mode, but hubs can’t.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Guest OS

A

The operating system installed on a virtual machine.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Half-duplex mode

A

A communication mode in which a device can send or receive data but can’t do both simultaneously. Hubs operate only in half-duplex mode; switches can operate in both half-duplex and full-duplex modes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

Header

A

Information added to the front end of a chunk of data so that the data can be correctly interpreted and processed by network protocols.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Honeypot

A

A network device, such as a server, that has been installed as a decoy to lure potential attackers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

Hop

A

Each router a packet must go through to get to the destination network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

hosted virtualization

A

A process in which the hypervisor implements OS virtualization by being installed in a general-purpose host OS, such as Windows 10 or Linux, and the host OS accesses host hardware on behalf of the guest OS. See also virtualization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

Hotspot

A

A public Wi-Fi network that can usually be accessed without an encryption or authentication code.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

Hub

A

A network device that performs the same function as a repeater but has several ports to connect a number of devices; sometimes called a multiport repeater. See also repeater.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

Hypervisor

A

The component of virtualization software that creates and monitors the virtual hardware environment, which allows multiple VMs to share physical hardware resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

infrastructure as a service (IaaS)

A

A category of cloud computing in which a company can use a provider’s storage or virtual servers as its needs demand; IaaS is also called “hosted infrastructure.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

infrastructure mode

A

An operational mode for Wi-Fi networks, in which wireless stations connect through a wireless access point before they can begin communicating with other devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

Integrated development environment (IDE)

A

An application that allows you to write, edit, debug, and prepare programs for upload to a development board for execution by a microcontroller or microprocessor.

55
Q

Internet

A

A worldwide public internetwork that uses standard protocols, such as TCP/IP, DNS, and HTTP, to transfer and view information.

56
Q

Internet Control Message Protocol (ICMP)

A

An Internetwork-layer protocol used to send error, status, and control messages between systems or devices. It’s an encapsulated IP protocol, meaning it’s wrapped in an IP header.

57
Q

Internet Message Access Protocol version 4 (IMAP4)

A

An Application-layer protocol used by an e-mail client to download messages from an e-mail server; IMAP4 operates on TCP port 143. IMAP4 also provides fault-tolerance features. It downloads only message headers from the server initially, and then downloads the message body and attachments after the message is selected.

58
Q

Internet of Things (IoT)

A

Household or industrial objects that have embedded computer and communication devices that allow the objects to send and receive data to and from a computer network. Examples include lights, thermostats, refrigerators, and devices such as Google Home and Amazon Echo. IoT is the digitization of our everyday world through the use of networked microprocessors and microcontrollers along with sensors, actuators, motors, and other I/O devices, plus the software that makes it all work together.

59
Q

Internet Protocol Security (IPsec)

A

An extension to IP working at the Internetwork layer that provides security by using authentication and encryption. It authenticates the identity of computers transmitting data with a password or some other form of credentials, and it encrypts data so that if packets are captured, the data will be unintelligible.

60
Q

Internet Protocol version 4 (IPv4)

A

A connectionless Internetwork-layer protocol that provides source and destination addressing and routing for the TCP/IP protocol suite; IPv4 uses 32-bit dotted decimal addresses.

61
Q

Internet Protocol version 6 (IPv6)

A

A connectionless Internetwork-layer protocol that provides source and destination addressing and routing for the TCP/IP protocol suite. IPv6 uses 128-bit hexadecimal addresses and has built-in security and QoS features.

62
Q

internetwork

A

A networked collection of LANs tied together by devices such as routers. See also local area network (LAN).

63
Q

intranet

A

A private network in which devices and servers are available only to users connected to the internal network.

64
Q

Intrusion detection system (IDS)

A

Usually a component of a firewall, a hardware device or software that detects an attempted security breach and notifies the network administrator. An IDS can also take countermeasures to stop an attack in progress.

65
Q

Intrusion prevention system (IPS)

A

A variation of an IDS that can take countermeasures if an attack is in progress.

66
Q

IP address

A

A 32-bit dotted decimal address used by IP to determine the network a host resides on and to identify hosts on the network at the Internetwork layer.

67
Q

IP address scope

A

A component of a DHCP server; it’s a range of IP addresses the server leases to clients requesting an IP address.

68
Q

IP prefix

A

A value used to express how many bits of an IP address are network ID bits. The value is usually preceded by a / symbol, as in 192.168.1.24/27; in this example, 27 is the IP prefix.

69
Q

IPv4 address

A

A 32-bit dotted decimal address containing a network ID, which specifies the network the computer is on, and a host ID, which uniquely identifies the computer on that network.

70
Q

localhost

A

A reserved name that corresponds to the loopback address in an IP network.

71
Q

logical topology

A

The path that data travels between computers on a network. The most common logical topologies are switched, bus, and ring.

72
Q

Loopback address

A

An address that always refers to the local computer; in IPv4, it’s 127.0.0.1, and in IPv6 it’s ::1. This address is used to test TCP/IP functionality on the local computer.

73
Q

malware

A

Any software designed to cause harm
or disruption to a computer system or otherwise perform activities on a computer without the consent of the computer’s owner.

74
Q

Media Access Control (MAC) sublayer

A

The lower sublayer of the IEEE Project 802 model for the OSI model’s Data Link layer. It handles accessing network media and mapping between logical and physical network addresses for NICs.

media access method A set of rules governing how and when the network medium can be accessed for transmission. The rules ensure that data is transmitted and received in an orderly fashion, and all stations have an opportunity to communicate. Also called “media access control.”

75
Q

Mesh topology

A

A topology in which each device in the network is connected to every other device, providing multiple pathways in the event of a device or cable failure.

76
Q

Multicast address

A

An address that identifies a group of computers running a multicast application.

77
Q

Multicasting

A

A network communication in which a packet is addressed so that more than one destination can receive it.

78
Q

Network Address Translation (NAT)

A

A service that translates a private IP address to a public IP address in packets destined for the Internet, and then translates the public IP address in the reply to the private address. NAT is often used to allow using private IP addresses while connected to the Internet.

79
Q

Network bandwidth

A

The amount of data that can be transferred on a network during a specific interval; usually measured in bits per second.

80
Q

Network client software

A

The application or OS service that can request information stored on another computer.

81
Q

Network File System (NFS)

A

The native Linux file-sharing protocol.

82
Q

Network interface card (NIC)

A

A device that creates and mediates the connection between a computer and the network medium.

83
Q

Network layer

A

Layer 3 of the OSI model handles logical addressing and routing of PDUs across internetworks. See also Open Systems Interconnection (OSI) reference model and protocol data unit (PDU).

84
Q

network protocols

A

The software defining the rules and formats a computer must use when sending information across the network.

85
Q

Packet

A

A chunk of data with source and destination IP addresses (as well as other IP information) added to it. Packets are generated and processed by network protocols.

86
Q

Physical bus topology

A

A network topology in which a continuous length of cable connects one computer to another in daisy-chain fashion. There’s no central interconnecting device.

87
Q

Physical layer

A

Layer 1, the bottom layer of the OSI model, transmits and receives signals and specifies the physical details of cables, NICs, connectors,
and hardware behavior. See also Open Systems Interconnection (OSI) reference model.

88
Q

Physical ring topology

A

A cabling arrangement
in which each device is connected to another
device in daisy-chain fashion, and the last device connects back to the first device to form a ring. Used by token ring and FDDI, the physical ring is rarely used now.

89
Q

Physical star topology

A

A network topology that uses a central device, such as a hub or switch, to interconnect computers in a LAN. Each computer has a single length of cable going from its NIC to the central device. It’s the most common physical topology in LANs.

90
Q

Physical topology

A

The arrangement of cabling and how cables connect one device to another in a network. The most common physical topology is a star, but bus, ring, point-to-point, and mesh topologies are also used.

91
Q

Platform as a service (PaaS)

A

A category of cloud computing in which a customer develops applications with the service provider’s development tools and infrastructure; PaaS is also called “hosted platform.” After applications are developed, they can be delivered to the customer’s users from the provider’s servers.

think BlueJ

92
Q

Port number

A

A field in the Transport-layer protocol header that specifies the source and destination Application-layer protocols used to request data
(the source) and be the target of the request (the destination).

93
Q

Port scanner

A

Software that determines which TCP and UDP ports are available on a computer or device.

94
Q

Post Office Protocol version 3 (POP3)

A

An Application-layer protocol used by a client e-mail application to download messages from an e-mail server; POP3 uses TCP port 110.

95
Q

private cloud

A

Cloud services that a company delivers to its own employees.

a type of deployment model

96
Q

Promiscuous mode

A

An operational mode of a NIC in which all frames are read and processed rather than only broadcast and unicast frames addressed to the NIC. Protocol analyzer software sets a NIC to promiscuous mode so that all network frames can be read and analyzed.

97
Q

Protocol data unit (PDU)

A

A unit of information passed as a self-contained data structure from one layer to another on its way up or down the network protocol stack.

98
Q

public cloud

A

Cloud services delivered by a third- party provider.

99
Q

ransomware

A

A type of malware that redirects you to a Web site warning that your system is infected and that you must install the vendor’s software or call a phone number to clean your system. Your system
is held hostage until you pay the perpetrator a fee to unlock the computer or decrypt your files.

100
Q

redundant array of independent disks (RAID)

A

A storage configuration of two or more disks, usually in a fault-tolerant arrangement, so that if one disk fails, data is preserved and the server can continue to operate.

101
Q

repeater

A

A network device that takes incoming signals and regenerates, or repeats, them to other parts of the network.

102
Q

request to send (RTS)

A

A signal used in wireless networks indicating that a computer has data ready to send on the network. See also access point (AP) and clear to send (CTS).

103
Q

router

A

A device that enables LANs to communicate with one another by forwarding packets from one LAN to another. Routers also forward packets from one router to another when LANs are separated by multiple routers.

104
Q

Secure Shell (SSH)

A

A secure Application-layer protocol used to connect to a device across a network via a command-line interface; SSH uses TCP port 22.

105
Q

segment

A

The unit of information used by TCP in the Transport layer. A segment is passed up to the Application layer as data and passed down to the Internetwork layer, where it becomes a packet.

106
Q

server

A

The term used to describe an OS designed mainly to share network resources, a computer with the main role of giving client computers access to network resources, and the software that responds to requests for network resources from client computers.

107
Q

service set identifier (SSID)

A

The name assigned to a wireless network that is configured on the wireless access point.

108
Q

Session layer

A

Layer 5 of the OSI model is responsible for setting up, maintaining, and ending communication sequences (called sessions) across a network. See also Open Systems Interconnection (OSI) reference model.

109
Q

Simple Mail Transfer Protocol (SMTP)

A

An Application-layer protocol used to send e-mail over the Internet; SMTP uses TCP port 25.

110
Q

Simple Network Management Protocol (SNMP)

A

An Application-layer protocol used to monitor and manage network devices and gather statistics about network traffic. It operates on UDP ports 161 and 162.

111
Q

software as a service (SaaS)

A

A category of cloud computing in which a customer pays for the use of applications that run on a service provider’s network; SaaS is also called “hosted applications.”

thinks apps that come on your phone

112
Q

spam

A

Unsolicited e-mail. The harm in spam is
the loss of productivity created when people receive dozens or hundreds of spam messages daily and the resources wasted to receive and store spam on e-mail servers.

113
Q

spoofed address

A

A source address inserted into a packet that is not the sender’s actual address.

114
Q

spyware

A

A type of malware that monitors or controls part of your computer at the expense of your privacy and the gain of some third party. See also malware.

115
Q

storage area network (SAN)

A

A high-speed, high-cost network storage solution for replacing locally attached drives on servers.

116
Q

subnet mask

A

subnet mask: A 32-bit dotted decimal number, consisting of a contiguous series of binary 1 digits followed by a contiguous series of binary 0 digits, that determines which part of an IP address is the network ID and which part is the host ID.

117
Q

subnets

A

Subdivisions of an IP network address space.

118
Q

subnetting

A

subnetting A process that reallocates bits from an IP address’s host portion to the network portion, creating multiple smaller address spaces. See also subnets.

119
Q

switch

A

A network device used to interconnect multiple computers; it reads the destination MAC address of an incoming frame to determine
on which switch port the destination device is located.

120
Q

Telnet

A

An unsecure Application-layer protocol used to connect to a device across a network via a command-line interface; Telnet uses TCP port 23.

121
Q

throughput

A

The actual amount of data transferred, not counting errors and acknowledgments.

122
Q

Transmission Control Protocol (TCP)

A

A connection-oriented Transport-layer protocol designed for reliable transfer of information in complex internetworks.

123
Q

Transmission Control Protocol/Internet Protocol (TCP/IP)

A

The most common protocol suite; TCP/IP is the default protocol in contemporary OSs and the protocol of the Internet.

124
Q

Transport layer

A

Layer 4 of the OSI model is responsible for reliable delivery of data streams across a network. Layer 4 protocols break large streams of data into smaller chunks and use sequence numbers and acknowledgments to provide communication and flow control.

125
Q

Tunneling

A

A common network protocol technique that allows transmitting a packet in a format that would otherwise be incompatible for the network architecture by encapsulating the packet in a compatible header format.

126
Q

User Datagram Protocol (UDP)

A

A connectionless Transport-layer protocol designed for efficient communication of generally small amounts of data.

127
Q

virtual machine (VM)

A

A software environment that emulates a physical computer’s hardware and BIOS.

128
Q

virtual network

A

A network configuration created by virtualization software and used by virtual machines for network communication.

129
Q

virtual private network (VPN)

A

A temporary or permanent connection across a public network that uses encryption technology to transmit and receive data. See also encryption.

130
Q

virtualization

A

A process that creates a software environment to emulate a computer’s hardware and BIOS, allowing multiple OSs to run on the same physical computer at the same time.

131
Q

Wi-Fi Protected Access (WPA)

A

A wireless security protocol that’s the successor to Wired Equivalent Privacy and has enhancements that make cracking the encryption code more difficult.

132
Q

Wi-Fi Protected Access 2 (WPA2)

A

The successor to Wi-Fi Protected Access that uses Advanced Encryption Standard for the highest level of encryption; WPA2
is the most commonly used encryption standard for wireless networks

133
Q

Wi-Fi Protected Access 3 (WPA3)

A

The strongest wireless encryption standard as of this writing. WPA3 uses the most current security methods while disallowing older, more vulnerable protocols.

134
Q

Wired Equivalent Privacy (WEP)

A

A wireless security protocol that encrypts data so that unauthorized people receiving wireless network signals can’t interpret the data easily.