Show
Home Subjects Expert solutions Create Log in Sign up Upgrade to remove ads Only ₩37,125/year
Terms in this set (20)an attack that sends unsolicited messages to Bluetooth-enabled devices Bluejacking An attack that accesses unauthorized information from a wireless device through a Bluetooth connection Bluesnarfing Established when two Bluetooth devices come with range of each other Piconet Wireless technology that uses short-range radio frequency (RF) transmissions Bluetooth attacks What improvements done on IEEE 802.11n speed, coverage area, resistance to interference and strong security a well-defined boundary protects data and resources Hard edge A framework for transporting authentication protocols EAP what are 4 type of EAP packets request, response, success, failure
EAP Extensible Authentication Protocol An unauthorized access point that allows an attacker to bypass network security configurations and usually set up by an insider Rogue access point An attacker attempts to mimic an authorized AP to capture transmissions from users Evil twin SSID Service Set Identifier designed to prevent man-in-the-middle attacks TKIP TKIP Temporal Key Integrity Protocol Devices can only communicate between themselves and cannot connect to another network ad hoc mode the attacker captures transmitted wireless data, record it, and then sends it on to the original recipient without the attacker's presence being detected wireless replay attack what are the type of wireless attacks rogue access point Counter Mode with Cipher Block Chaining Message Authentication Code Protocol (CCMP) is the encryption protocol use for WPA2 MIC Message Integrity Check in wireless networks, AP can be divided into what? fat vs. thin, controller vs. standalone, and captive portal APs Sets found in the same folderChapter 1 Sec21 terms louis_dajeu chap 6 Security Fundamentals33 terms louis_dajeu Chap 7 Administering a Security Network39 terms louis_dajeu chapter 9 client and application15 terms louis_dajeu Other sets by this creatorchapter 12 Access Management34 terms louis_dajeu chapter 11 Authentication20 terms louis_dajeu chapter 3 Basic cryptography7 terms louis_dajeu chapter 4 advanced cryptography16 terms louis_dajeu Recommended textbook solutions
Fundamentals of Database Systems7th EditionRamez Elmasri, Shamkant B. Navathe 687 solutions
Service Management: Operations, Strategy, and Information Technology7th EditionJames Fitzsimmons, Mona Fitzsimmons 103 solutions
Starting Out with Python4th EditionTony Gaddis 629 solutions
Information Technology Project Management: Providing Measurable Organizational Value5th EditionJack T. Marchewka 346 solutions Other Quizlet setsSecurity+36 terms eric1368 chapter 4 vocab22 terms Mathew_Elmore1 Lesson 4 - Understanding Network Security22 terms mengland324 MTA study test 123 terms Andrew_Bumgarner7 Which of the following sends unsolicited business cards and messages to a Bluetooth device 8.2 7?Bluejacking is the sending of unsolicited messages over a Bluetooth connection.
Which of the following terms means sending unsolicited messages over Bluetooth?Bluejacking is the sending of unsolicited messages over Bluetooth to Bluetooth-enabled devices such as mobile phones, PDAs or laptop computers, sending a vCard which typically contains a message in the name field (i.e., for bluedating or bluechat) to another Bluetooth-enabled device via the OBEX protocol.
Which remote access authentication protocol allows for the use of smart cards for authentication?EAP-TLS is used with smart card user authentication. A smart card holds a digital certificate which, with the user-entered personal identification number (PIN), allows the user to be authenticated on the network. EAP-TLS relies on digital certificates to verify the identities of both the client and the server.
Which of the following is used on a wireless network to identify the network name quizlet?Which of the following is used on a wireless network to identify the network name? Wireless devices use the SSID (Service Set Identification) to identify the network name. All devices on a wireless network use the same SSID.
|