Which of the following sends unsolicited business cards and messages to a bluetooth device? quizlet

Home

Subjects

Expert solutions

Create

Log in

Sign up

Upgrade to remove ads

Only ₩37,125/year

  • Flashcards

  • Learn

  • Test

  • Match

  • Flashcards

  • Learn

  • Test

  • Match

Terms in this set (20)

an attack that sends unsolicited messages to Bluetooth-enabled devices

Bluejacking

An attack that accesses unauthorized information from a wireless device through a Bluetooth connection

Bluesnarfing

Established when two Bluetooth devices come with range of each other

Piconet

Wireless technology that uses short-range radio frequency (RF) transmissions

Bluetooth attacks

What improvements done on IEEE 802.11n

speed, coverage area, resistance to interference and strong security

a well-defined boundary protects data and resources

Hard edge

A framework for transporting authentication protocols

EAP

what are 4 type of EAP packets

request, response, success, failure

EAP

Extensible Authentication Protocol

An unauthorized access point that allows an attacker to bypass network security configurations and usually set up by an insider

Rogue access point

An attacker attempts to mimic an authorized AP to capture transmissions from users

Evil twin

SSID

Service Set Identifier

designed to prevent man-in-the-middle attacks

TKIP

TKIP

Temporal Key Integrity Protocol

Devices can only communicate between themselves and cannot connect to another network

ad hoc mode

the attacker captures transmitted wireless data, record it, and then sends it on to the original recipient without the attacker's presence being detected

wireless replay attack

what are the type of wireless attacks

rogue access point
evil twins
intercepting wireless data
wireless replay attacks
DOS

Counter Mode with Cipher Block Chaining Message Authentication Code Protocol (CCMP) is the encryption protocol use for

WPA2

MIC

Message Integrity Check

in wireless networks, AP can be divided into what?

fat vs. thin, controller vs. standalone, and captive portal APs

Sets found in the same folder

Chapter 1 Sec

21 terms

louis_dajeu

chap 6 Security Fundamentals

33 terms

louis_dajeu

Chap 7 Administering a Security Network

39 terms

louis_dajeu

chapter 9 client and application

15 terms

louis_dajeu

Other sets by this creator

chapter 12 Access Management

34 terms

louis_dajeu

chapter 11 Authentication

20 terms

louis_dajeu

chapter 3 Basic cryptography

7 terms

louis_dajeu

chapter 4 advanced cryptography

16 terms

louis_dajeu

Recommended textbook solutions

Which of the following sends unsolicited business cards and messages to a bluetooth device? quizlet

Fundamentals of Database Systems

7th EditionRamez Elmasri, Shamkant B. Navathe

687 solutions

Which of the following sends unsolicited business cards and messages to a bluetooth device? quizlet

Service Management: Operations, Strategy, and Information Technology

7th EditionJames Fitzsimmons, Mona Fitzsimmons

103 solutions

Which of the following sends unsolicited business cards and messages to a bluetooth device? quizlet

Starting Out with Python

4th EditionTony Gaddis

629 solutions

Which of the following sends unsolicited business cards and messages to a bluetooth device? quizlet

Information Technology Project Management: Providing Measurable Organizational Value

5th EditionJack T. Marchewka

346 solutions

Other Quizlet sets

Security+

36 terms

eric1368

chapter 4 vocab

22 terms

Mathew_Elmore1

Lesson 4 - Understanding Network Security

22 terms

mengland324

MTA study test 1

23 terms

Andrew_Bumgarner7

Which of the following sends unsolicited business cards and messages to a Bluetooth device 8.2 7?

Bluejacking is the sending of unsolicited messages over a Bluetooth connection.

Which of the following terms means sending unsolicited messages over Bluetooth?

Bluejacking is the sending of unsolicited messages over Bluetooth to Bluetooth-enabled devices such as mobile phones, PDAs or laptop computers, sending a vCard which typically contains a message in the name field (i.e., for bluedating or bluechat) to another Bluetooth-enabled device via the OBEX protocol.

Which remote access authentication protocol allows for the use of smart cards for authentication?

EAP-TLS is used with smart card user authentication. A smart card holds a digital certificate which, with the user-entered personal identification number (PIN), allows the user to be authenticated on the network. EAP-TLS relies on digital certificates to verify the identities of both the client and the server.

Which of the following is used on a wireless network to identify the network name quizlet?

Which of the following is used on a wireless network to identify the network name? Wireless devices use the SSID (Service Set Identification) to identify the network name. All devices on a wireless network use the same SSID.