Deck 8: Wireless Network Security

Full screen (f)
exit full mode
Question
Because PEAP can be vulnerable to specific types of attacks, Cisco now recommends that users migrate to a more secure EAP than PEAP.
Use Space or
up arrow
down arrow
to flip the card.
Question
____ is designed to detect any changes in a packet, whether accidental or intentional.

A) CBC
B) CRC
C) AES
D) TKIP
Question
Slave devices that are connected to the piconet and are sending transmissions are known as ____ slaves.

A) active
B) passive
C) hybrid
D) neutral
Question
The IEEE 802.15.1-2005 Wireless Personal Area Network standard was based on the ____ specifications.

A) Bluetooth v2.1
B) Bluetooth v1.2
C) Bluetooth v 1.0
D) Bluetooth v 1.1
Question
The SSID can generally be any alphanumeric string from 2 to ___ characters.

A) 23
B) 28
C) 32
D) 34
Question
Because of the weaknesses of WEP, it is possible for an attacker to identify two packets derived from the same IV.
Question
Bluetooth is a ____ technology designed for data communication over short distances.

A) Small Area Network
B) Private Area Network
C) Personal Area Network
D) Limited Area Network
Question
Bluetooth devices are not backward compatible with previous versions.
Question
APs use antennas that radiate a signal in all directions.
Question
____ is the encryption protocol standard for WPA2.

A) AES-CCMP
B) AES-CTR
C) AES-TKIP
D) AES-SCMP
Question
A ____ access point is an unauthorized AP that allows an attacker to bypass many of the network security configurations and opens the network and its users to attacks.

A) random
B) sanctioned
C) rogue
D) legitimate
Question
Because antennas are generally positioned to provide the broadest area of coverage, APs should be located at the end of the coverage area.
Question
____ is a framework for transporting authentication protocols instead of the authentication protocol itself.

A) PEAP
B) TKIP
C) SSL
D) EAP
Question
A group of piconets in which connections exist between different piconets is called a ____.

A) broadnet
B) honeynet
C) boundnet
D) scatternet
Question
When a device receives a beacon frame from an AP, the device then sends a frame known as a(n) ____ frame to the AP.

A) broadcast SSID
B) association request
C) disassociation request
D) connect request
Question
____ is an attack that accesses unauthorized information from a wireless device through a Bluetooth connection, often between cell phones and laptop computers.

A) Bluejacking
B) Bluecracking
C) Bluesnarfing
D) Bluetalking
Question
An ____ is an AP that is set up by an attacker.

A) active twin
B) authorized twin
C) internal replica
D) evil twin
Question
Most Bluetooth devices use a Class 2 radio that has a range of ____ feet.

A) 10
B) 18
C) 15
D) 33
Question
____ is an attack that sends unsolicited messages to Bluetooth-enabled devices.

A) Bluesnarfing
B) Bluejacking
C) Bluecracking
D) Bluetalking
Question
A(n) ____ acts as the "base station" for the wireless network.

A) AP
B) endpoint
C) WMM
D) ad-hoc peer
Question
____________________ technology enables users to connect wirelessly to a wide range of computing and telecommunications devices.
Question
If the EAP authentication is successful, a success packet is sent to the ____________________.
Question
Identify and describe two types of wireless probes.
Question
When using IEEE 802.1x authentication, ____________________ prevents an unauthenticated device, either wired or wireless, from receiving any network traffic until its identity can be verified.
Question
Explain why it is important to be able to control the power level at which the WLAN transmits.
Question
EAP request packets are issued by the ____.

A) supplicant
B) authenticator
C) authentication server
D) proxy
Question
A(n) ____ packet contains a field that indicates the function of the packet and an identifier field used to match requests and responses.

A) ICMP
B) TKIP
C) EAP
D) RADIUS
Question
____ allow a single access point to service different types of users.

A) Wireless VPNs
B) Wireless encryption standards
C) Wireless multimedia protocols
D) Wireless VLANs
Question
Discuss how to prevent bluesnarfing.
Question
Discuss the different types of interference one might encounter using wireless devices.
Question
Explain what war driving is.
Question
On a piconet, slave devices that are connected but are not actively participating are called ____________________ slaves.
Question
____ is considered a more flexible EAP scheme because it creates an encrypted channel between the client and the authentication server.

A) TKIP
B) LEAP
C) PEAP
D) ICMP
Question
____ access points are serious threats to network security because they allow attackers to intercept the RF signal and bypass network security to attack the network or capture sensitive data.

A) Legitimate
B) Rogue
C) Sanctioned
D) Twin
Question
____ requires mutual authentication used for WLAN encryption using Cisco client software.

A) LEAP
B) TKIP
C) EAP
D) PEAP
Question
List and describe the major parts of an access point.
Question
When a wireless device looks for beacon frames it is known as ____________________.
Question
What are the four types of packets used by EAP?
Question
Describe a piconet.
Question
Describe how wireless VLANs can be configured.
Question
Discuss how and why some organizations set up a wireless VLAN for employees and another for guests.
Question
Match between columns
A proprietary EAP method developed by Cisco Systems
SSID
A proprietary EAP method developed by Cisco Systems
Bluetooth
A proprietary EAP method developed by Cisco Systems
Evil twin
A proprietary EAP method developed by Cisco Systems
Initialization vector
A proprietary EAP method developed by Cisco Systems
War driving
A proprietary EAP method developed by Cisco Systems
War chalking
A proprietary EAP method developed by Cisco Systems
TKIP
A proprietary EAP method developed by Cisco Systems
Lightweight EAP
A proprietary EAP method developed by Cisco Systems
Protected EAP
Designed to simplify the deployment of 802.1x by using Microsoft Windows logins and passwords
SSID
Designed to simplify the deployment of 802.1x by using Microsoft Windows logins and passwords
Bluetooth
Designed to simplify the deployment of 802.1x by using Microsoft Windows logins and passwords
Evil twin
Designed to simplify the deployment of 802.1x by using Microsoft Windows logins and passwords
Initialization vector
Designed to simplify the deployment of 802.1x by using Microsoft Windows logins and passwords
War driving
Designed to simplify the deployment of 802.1x by using Microsoft Windows logins and passwords
War chalking
Designed to simplify the deployment of 802.1x by using Microsoft Windows logins and passwords
TKIP
Designed to simplify the deployment of 802.1x by using Microsoft Windows logins and passwords
Lightweight EAP
Designed to simplify the deployment of 802.1x by using Microsoft Windows logins and passwords
Protected EAP
A wireless technology that uses short-range radio frequency (RF) transmissions and provides for rapid ad hoc device pairings
SSID
A wireless technology that uses short-range radio frequency (RF) transmissions and provides for rapid ad hoc device pairings
Bluetooth
A wireless technology that uses short-range radio frequency (RF) transmissions and provides for rapid ad hoc device pairings
Evil twin
A wireless technology that uses short-range radio frequency (RF) transmissions and provides for rapid ad hoc device pairings
Initialization vector
A wireless technology that uses short-range radio frequency (RF) transmissions and provides for rapid ad hoc device pairings
War driving
A wireless technology that uses short-range radio frequency (RF) transmissions and provides for rapid ad hoc device pairings
War chalking
A wireless technology that uses short-range radio frequency (RF) transmissions and provides for rapid ad hoc device pairings
TKIP
A wireless technology that uses short-range radio frequency (RF) transmissions and provides for rapid ad hoc device pairings
Lightweight EAP
A wireless technology that uses short-range radio frequency (RF) transmissions and provides for rapid ad hoc device pairings
Protected EAP
A WPA encryption technology
SSID
A WPA encryption technology
Bluetooth
A WPA encryption technology
Evil twin
A WPA encryption technology
Initialization vector
A WPA encryption technology
War driving
A WPA encryption technology
War chalking
A WPA encryption technology
TKIP
A WPA encryption technology
Lightweight EAP
A WPA encryption technology
Protected EAP
The process of documenting and then advertising the location of wireless LANs for others to use
SSID
The process of documenting and then advertising the location of wireless LANs for others to use
Bluetooth
The process of documenting and then advertising the location of wireless LANs for others to use
Evil twin
The process of documenting and then advertising the location of wireless LANs for others to use
Initialization vector
The process of documenting and then advertising the location of wireless LANs for others to use
War driving
The process of documenting and then advertising the location of wireless LANs for others to use
War chalking
The process of documenting and then advertising the location of wireless LANs for others to use
TKIP
The process of documenting and then advertising the location of wireless LANs for others to use
Lightweight EAP
The process of documenting and then advertising the location of wireless LANs for others to use
Protected EAP
Searching for wireless signals from an automobile or on foot using a portable computing device
SSID
Searching for wireless signals from an automobile or on foot using a portable computing device
Bluetooth
Searching for wireless signals from an automobile or on foot using a portable computing device
Evil twin
Searching for wireless signals from an automobile or on foot using a portable computing device
Initialization vector
Searching for wireless signals from an automobile or on foot using a portable computing device
War driving
Searching for wireless signals from an automobile or on foot using a portable computing device
War chalking
Searching for wireless signals from an automobile or on foot using a portable computing device
TKIP
Searching for wireless signals from an automobile or on foot using a portable computing device
Lightweight EAP
Searching for wireless signals from an automobile or on foot using a portable computing device
Protected EAP
An AP set up by an attacker to mimic an authorized AP and capture transmissions
SSID
An AP set up by an attacker to mimic an authorized AP and capture transmissions
Bluetooth
An AP set up by an attacker to mimic an authorized AP and capture transmissions
Evil twin
An AP set up by an attacker to mimic an authorized AP and capture transmissions
Initialization vector
An AP set up by an attacker to mimic an authorized AP and capture transmissions
War driving
An AP set up by an attacker to mimic an authorized AP and capture transmissions
War chalking
An AP set up by an attacker to mimic an authorized AP and capture transmissions
TKIP
An AP set up by an attacker to mimic an authorized AP and capture transmissions
Lightweight EAP
An AP set up by an attacker to mimic an authorized AP and capture transmissions
Protected EAP
A 24-bit value used in WEP that changes each time a packet is encrypted
SSID
A 24-bit value used in WEP that changes each time a packet is encrypted
Bluetooth
A 24-bit value used in WEP that changes each time a packet is encrypted
Evil twin
A 24-bit value used in WEP that changes each time a packet is encrypted
Initialization vector
A 24-bit value used in WEP that changes each time a packet is encrypted
War driving
A 24-bit value used in WEP that changes each time a packet is encrypted
War chalking
A 24-bit value used in WEP that changes each time a packet is encrypted
TKIP
A 24-bit value used in WEP that changes each time a packet is encrypted
Lightweight EAP
A 24-bit value used in WEP that changes each time a packet is encrypted
Protected EAP
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/42
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 8: Wireless Network Security
1
Because PEAP can be vulnerable to specific types of attacks, Cisco now recommends that users migrate to a more secure EAP than PEAP.
False
2
____ is designed to detect any changes in a packet, whether accidental or intentional.

A) CBC
B) CRC
C) AES
D) TKIP
B
3
Slave devices that are connected to the piconet and are sending transmissions are known as ____ slaves.

A) active
B) passive
C) hybrid
D) neutral
A
4
The IEEE 802.15.1-2005 Wireless Personal Area Network standard was based on the ____ specifications.

A) Bluetooth v2.1
B) Bluetooth v1.2
C) Bluetooth v 1.0
D) Bluetooth v 1.1
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
5
The SSID can generally be any alphanumeric string from 2 to ___ characters.

A) 23
B) 28
C) 32
D) 34
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
6
Because of the weaknesses of WEP, it is possible for an attacker to identify two packets derived from the same IV.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
7
Bluetooth is a ____ technology designed for data communication over short distances.

A) Small Area Network
B) Private Area Network
C) Personal Area Network
D) Limited Area Network
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
8
Bluetooth devices are not backward compatible with previous versions.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
9
APs use antennas that radiate a signal in all directions.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
10
____ is the encryption protocol standard for WPA2.

A) AES-CCMP
B) AES-CTR
C) AES-TKIP
D) AES-SCMP
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
11
A ____ access point is an unauthorized AP that allows an attacker to bypass many of the network security configurations and opens the network and its users to attacks.

A) random
B) sanctioned
C) rogue
D) legitimate
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
12
Because antennas are generally positioned to provide the broadest area of coverage, APs should be located at the end of the coverage area.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
13
____ is a framework for transporting authentication protocols instead of the authentication protocol itself.

A) PEAP
B) TKIP
C) SSL
D) EAP
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
14
A group of piconets in which connections exist between different piconets is called a ____.

A) broadnet
B) honeynet
C) boundnet
D) scatternet
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
15
When a device receives a beacon frame from an AP, the device then sends a frame known as a(n) ____ frame to the AP.

A) broadcast SSID
B) association request
C) disassociation request
D) connect request
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
16
____ is an attack that accesses unauthorized information from a wireless device through a Bluetooth connection, often between cell phones and laptop computers.

A) Bluejacking
B) Bluecracking
C) Bluesnarfing
D) Bluetalking
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
17
An ____ is an AP that is set up by an attacker.

A) active twin
B) authorized twin
C) internal replica
D) evil twin
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
18
Most Bluetooth devices use a Class 2 radio that has a range of ____ feet.

A) 10
B) 18
C) 15
D) 33
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
19
____ is an attack that sends unsolicited messages to Bluetooth-enabled devices.

A) Bluesnarfing
B) Bluejacking
C) Bluecracking
D) Bluetalking
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
20
A(n) ____ acts as the "base station" for the wireless network.

A) AP
B) endpoint
C) WMM
D) ad-hoc peer
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
21
____________________ technology enables users to connect wirelessly to a wide range of computing and telecommunications devices.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
22
If the EAP authentication is successful, a success packet is sent to the ____________________.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
23
Identify and describe two types of wireless probes.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
24
When using IEEE 802.1x authentication, ____________________ prevents an unauthenticated device, either wired or wireless, from receiving any network traffic until its identity can be verified.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
25
Explain why it is important to be able to control the power level at which the WLAN transmits.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
26
EAP request packets are issued by the ____.

A) supplicant
B) authenticator
C) authentication server
D) proxy
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
27
A(n) ____ packet contains a field that indicates the function of the packet and an identifier field used to match requests and responses.

A) ICMP
B) TKIP
C) EAP
D) RADIUS
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
28
____ allow a single access point to service different types of users.

A) Wireless VPNs
B) Wireless encryption standards
C) Wireless multimedia protocols
D) Wireless VLANs
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
29
Discuss how to prevent bluesnarfing.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
30
Discuss the different types of interference one might encounter using wireless devices.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
31
Explain what war driving is.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
32
On a piconet, slave devices that are connected but are not actively participating are called ____________________ slaves.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
33
____ is considered a more flexible EAP scheme because it creates an encrypted channel between the client and the authentication server.

A) TKIP
B) LEAP
C) PEAP
D) ICMP
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
34
____ access points are serious threats to network security because they allow attackers to intercept the RF signal and bypass network security to attack the network or capture sensitive data.

A) Legitimate
B) Rogue
C) Sanctioned
D) Twin
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
35
____ requires mutual authentication used for WLAN encryption using Cisco client software.

A) LEAP
B) TKIP
C) EAP
D) PEAP
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
36
List and describe the major parts of an access point.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
37
When a wireless device looks for beacon frames it is known as ____________________.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
38
What are the four types of packets used by EAP?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
39
Describe a piconet.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
40
Describe how wireless VLANs can be configured.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
41
Discuss how and why some organizations set up a wireless VLAN for employees and another for guests.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
42
Match between columns
A proprietary EAP method developed by Cisco Systems
SSID
A proprietary EAP method developed by Cisco Systems
Bluetooth
A proprietary EAP method developed by Cisco Systems
Evil twin
A proprietary EAP method developed by Cisco Systems
Initialization vector
A proprietary EAP method developed by Cisco Systems
War driving
A proprietary EAP method developed by Cisco Systems
War chalking
A proprietary EAP method developed by Cisco Systems
TKIP
A proprietary EAP method developed by Cisco Systems
Lightweight EAP
A proprietary EAP method developed by Cisco Systems
Protected EAP
Designed to simplify the deployment of 802.1x by using Microsoft Windows logins and passwords
SSID
Designed to simplify the deployment of 802.1x by using Microsoft Windows logins and passwords
Bluetooth
Designed to simplify the deployment of 802.1x by using Microsoft Windows logins and passwords
Evil twin
Designed to simplify the deployment of 802.1x by using Microsoft Windows logins and passwords
Initialization vector
Designed to simplify the deployment of 802.1x by using Microsoft Windows logins and passwords
War driving
Designed to simplify the deployment of 802.1x by using Microsoft Windows logins and passwords
War chalking
Designed to simplify the deployment of 802.1x by using Microsoft Windows logins and passwords
TKIP
Designed to simplify the deployment of 802.1x by using Microsoft Windows logins and passwords
Lightweight EAP
Designed to simplify the deployment of 802.1x by using Microsoft Windows logins and passwords
Protected EAP
A wireless technology that uses short-range radio frequency (RF) transmissions and provides for rapid ad hoc device pairings
SSID
A wireless technology that uses short-range radio frequency (RF) transmissions and provides for rapid ad hoc device pairings
Bluetooth
A wireless technology that uses short-range radio frequency (RF) transmissions and provides for rapid ad hoc device pairings
Evil twin
A wireless technology that uses short-range radio frequency (RF) transmissions and provides for rapid ad hoc device pairings
Initialization vector
A wireless technology that uses short-range radio frequency (RF) transmissions and provides for rapid ad hoc device pairings
War driving
A wireless technology that uses short-range radio frequency (RF) transmissions and provides for rapid ad hoc device pairings
War chalking
A wireless technology that uses short-range radio frequency (RF) transmissions and provides for rapid ad hoc device pairings
TKIP
A wireless technology that uses short-range radio frequency (RF) transmissions and provides for rapid ad hoc device pairings
Lightweight EAP
A wireless technology that uses short-range radio frequency (RF) transmissions and provides for rapid ad hoc device pairings
Protected EAP
A WPA encryption technology
SSID
A WPA encryption technology
Bluetooth
A WPA encryption technology
Evil twin
A WPA encryption technology
Initialization vector
A WPA encryption technology
War driving
A WPA encryption technology
War chalking
A WPA encryption technology
TKIP
A WPA encryption technology
Lightweight EAP
A WPA encryption technology
Protected EAP
The process of documenting and then advertising the location of wireless LANs for others to use
SSID
The process of documenting and then advertising the location of wireless LANs for others to use
Bluetooth
The process of documenting and then advertising the location of wireless LANs for others to use
Evil twin
The process of documenting and then advertising the location of wireless LANs for others to use
Initialization vector
The process of documenting and then advertising the location of wireless LANs for others to use
War driving
The process of documenting and then advertising the location of wireless LANs for others to use
War chalking
The process of documenting and then advertising the location of wireless LANs for others to use
TKIP
The process of documenting and then advertising the location of wireless LANs for others to use
Lightweight EAP
The process of documenting and then advertising the location of wireless LANs for others to use
Protected EAP
Searching for wireless signals from an automobile or on foot using a portable computing device
SSID
Searching for wireless signals from an automobile or on foot using a portable computing device
Bluetooth
Searching for wireless signals from an automobile or on foot using a portable computing device
Evil twin
Searching for wireless signals from an automobile or on foot using a portable computing device
Initialization vector
Searching for wireless signals from an automobile or on foot using a portable computing device
War driving
Searching for wireless signals from an automobile or on foot using a portable computing device
War chalking
Searching for wireless signals from an automobile or on foot using a portable computing device
TKIP
Searching for wireless signals from an automobile or on foot using a portable computing device
Lightweight EAP
Searching for wireless signals from an automobile or on foot using a portable computing device
Protected EAP
An AP set up by an attacker to mimic an authorized AP and capture transmissions
SSID
An AP set up by an attacker to mimic an authorized AP and capture transmissions
Bluetooth
An AP set up by an attacker to mimic an authorized AP and capture transmissions
Evil twin
An AP set up by an attacker to mimic an authorized AP and capture transmissions
Initialization vector
An AP set up by an attacker to mimic an authorized AP and capture transmissions
War driving
An AP set up by an attacker to mimic an authorized AP and capture transmissions
War chalking
An AP set up by an attacker to mimic an authorized AP and capture transmissions
TKIP
An AP set up by an attacker to mimic an authorized AP and capture transmissions
Lightweight EAP
An AP set up by an attacker to mimic an authorized AP and capture transmissions
Protected EAP
A 24-bit value used in WEP that changes each time a packet is encrypted
SSID
A 24-bit value used in WEP that changes each time a packet is encrypted
Bluetooth
A 24-bit value used in WEP that changes each time a packet is encrypted
Evil twin
A 24-bit value used in WEP that changes each time a packet is encrypted
Initialization vector
A 24-bit value used in WEP that changes each time a packet is encrypted
War driving
A 24-bit value used in WEP that changes each time a packet is encrypted
War chalking
A 24-bit value used in WEP that changes each time a packet is encrypted
TKIP
A 24-bit value used in WEP that changes each time a packet is encrypted
Lightweight EAP
A 24-bit value used in WEP that changes each time a packet is encrypted
Protected EAP
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 42 flashcards in this deck.