Deck 3: Passive Wireless Discovery

Full screen (f)
exit full mode
Question
Passive wireless discovery through wardriving is in itself an illegal activity.
Use Space or
up arrow
down arrow
to flip the card.
Question
____ relies on tricking and deceiving someone to access a system.

A) Social engineering
B) Wardriving
C) Warchalking
D) Wireless site mapping
Question
____ is a version of NetStumbler that runs on handheld devices.

A) KisMAC
B) MiniStumbler
C) AiroPeek
D) Kismet
Question
The informal expression used more often for searching for RF signals is ____.

A) phishing
B) pharming
C) beaconing
D) wardriving
Question
NetStumbler can capture and decode wireless packets, monitor utilization, or make automatic connections to networks it discovers.
Question
Instead of asking the user to visit a fraudulent Web site, ____ automatically redirects the user to the fake site.

A) spear phishing
B) phishing
C) pharming
D) Google phishing
Question
____ is a type of solid-state (microchip) technology in which there are no moving parts.

A) Flash memory
B) Sled
C) Mini PCI
D) Type II PC card
Question
____ is a passive method of receiving WLAN signals.

A) CDMA
B) RFMON
C) SDIO NOW!
D) Sled
Question
The hardware that allows the mobile computing device to detect a wireless signal is a(n) ____.

A) access point card
B) CompactFlash card
C) flash memory
D) wireless network interface card
Question
Most phishing sites only function for three to five days to prevent law enforcement agencies from tracking the attackers.
Question
Many of the functions of a PDA are now incorporated into cellular telephones sometimes called ____.

A) smartphones
B) handheld PCs
C) tablet computers
D) slate computers
Question
____ targets only specific users.

A) Google pharming
B) Spear phishing
C) Pharming
D) Google phishing
Question
A significant advantage of using PDAs is their ability to synchronize data with another computer.
Question
____ involves sending an e-mail or displaying a Web announcement that falsely claims to be from a legitimate enterprise in an attempt to trick the user into surrendering information.

A) Wardriving
B) Dumpster diving
C) Warchalking
D) Phishing
Question
____ antennas send a narrowly focused signal beam.

A) Cyclic directional
B) Omni-directional
C) Semi-directional
D) Highly directional
Question
A(n) ____ PC is small enough to be held in a single hand yet has many of the features of a laptop computer.

A) PCMCIA
B) Tablet
C) handheld
D) slate
Question
At regular intervals (normally every 100 ms) the wireless access point sends a beacon frame to announce its presence and to provide the necessary information for devices that want to join the network. This process is known as ____.

A) phishing
B) beaconing
C) pharming
D) mapping
Question
Wardriving software that is specifically designed to pick up a radio frequency WLAN signal is known as a ____.

A) sled
B) client utility
C) freeware discovery application
D) WZC
Question
A(n) ____ antenna focuses the energy in one direction.

A) cyclic directional
B) omni-directional
C) semi-directional
D) highly directional
Question
Promiscuous mode will not work on a WLAN.
Question
Known as ____, these attackers lack the technical skills of more advanced users and are sometimes considered more dangerous.

A) hackers
B) script kiddies
C) crackers
D) warchalkers
Question
What are some of the techniques used by wardrivers to locate RF signals?
Question
What are some of the ways to recognize phishing messages?
Question
____________________ is the formal expression used to refer to the process of finding a WLAN signal and recording information about it.
Question
____ allows computers and network equipment to gather data about network performance.

A) ICMP
B) SMTP
C) FTP
D) SNMP
Question
The first two versions of SNMP, SNMPv1 and SNMPv2, used ____ that acted like a password to allow or deny access to the information that was collected.

A) community strings
B) management information base (MIB)
C) packet sniffers
D) flash memories
Question
Wireless networks were identified by drawing on sidewalks or walls around the area of the network known as ____.

A) warchalking
B) phishing
C) pharming
D) dumpster diving
Question
What are some of the security problems related to improperly recycled equipment?
Question
A wired NIC can be set to ____________________, which turns off the filtering mechanism and allows it to capture all the packets it receives.
Question
Describe two examples of social engineering attacks.
Question
____________________ involves phishers setting up their own search engines to direct traffic to illegitimate sites.
Question
What are some of the options for wireless NICs available for smaller devices like handheld PCs and PDAs?
Question
Each SNMP agent monitors network traffic and stores that information in its ____.

A) community strings
B) packet sniffer
C) management information base (MIB)
D) Type II PC card
Question
The GPS receiver can deduce its own location based on a mathematical principle called ____________________.
Question
What are the main characteristics of WLAN client utilities?
Question
The smallest mobile computing device is a(n) ____________________.
Question
What are the two fundamental characteristics of antennas?
Question
____, which runs under the Linux operating system, can report similar information as NetStumbler, such as the SSID.

A) Kismet
B) KisMAC
C) WZC
D) GPSMac
Question
Briefly describe the main characteristics of a tablet computer.
Question
Briefly describe a wireless packet sniffer.
Question
Briefly describe a packet sniffer.
Question
Match between columns
group of integrated circuits that provide the functionality of the wireless NIC.
Omni-directional antenna
group of integrated circuits that provide the functionality of the wireless NIC.
Phishing
group of integrated circuits that provide the functionality of the wireless NIC.
IPSec
group of integrated circuits that provide the functionality of the wireless NIC.
Chipset
group of integrated circuits that provide the functionality of the wireless NIC.
SNMP management station
group of integrated circuits that provide the functionality of the wireless NIC.
Handheld PC
group of integrated circuits that provide the functionality of the wireless NIC.
Dumpster diving
group of integrated circuits that provide the functionality of the wireless NIC.
Mini PCI
group of integrated circuits that provide the functionality of the wireless NIC.
Wireless Zero Configuration (WZC)
communicates with the software agents on each network device and collects the data stored in the MIBs.
Omni-directional antenna
communicates with the software agents on each network device and collects the data stored in the MIBs.
Phishing
communicates with the software agents on each network device and collects the data stored in the MIBs.
IPSec
communicates with the software agents on each network device and collects the data stored in the MIBs.
Chipset
communicates with the software agents on each network device and collects the data stored in the MIBs.
SNMP management station
communicates with the software agents on each network device and collects the data stored in the MIBs.
Handheld PC
communicates with the software agents on each network device and collects the data stored in the MIBs.
Dumpster diving
communicates with the software agents on each network device and collects the data stored in the MIBs.
Mini PCI
communicates with the software agents on each network device and collects the data stored in the MIBs.
Wireless Zero Configuration (WZC)
detects signals from all directions equally.
Omni-directional antenna
detects signals from all directions equally.
Phishing
detects signals from all directions equally.
IPSec
detects signals from all directions equally.
Chipset
detects signals from all directions equally.
SNMP management station
detects signals from all directions equally.
Handheld PC
detects signals from all directions equally.
Dumpster diving
detects signals from all directions equally.
Mini PCI
detects signals from all directions equally.
Wireless Zero Configuration (WZC)
set of protocols developed to support the secure exchange of packets.
Omni-directional antenna
set of protocols developed to support the secure exchange of packets.
Phishing
set of protocols developed to support the secure exchange of packets.
IPSec
set of protocols developed to support the secure exchange of packets.
Chipset
set of protocols developed to support the secure exchange of packets.
SNMP management station
set of protocols developed to support the secure exchange of packets.
Handheld PC
set of protocols developed to support the secure exchange of packets.
Dumpster diving
set of protocols developed to support the secure exchange of packets.
Mini PCI
set of protocols developed to support the secure exchange of packets.
Wireless Zero Configuration (WZC)
looking through large (usually outdoor) trash receptacles.
Omni-directional antenna
looking through large (usually outdoor) trash receptacles.
Phishing
looking through large (usually outdoor) trash receptacles.
IPSec
looking through large (usually outdoor) trash receptacles.
Chipset
looking through large (usually outdoor) trash receptacles.
SNMP management station
looking through large (usually outdoor) trash receptacles.
Handheld PC
looking through large (usually outdoor) trash receptacles.
Dumpster diving
looking through large (usually outdoor) trash receptacles.
Mini PCI
looking through large (usually outdoor) trash receptacles.
Wireless Zero Configuration (WZC)
designed to provide the familiar applications from a desktop computer in a mobile format.
Omni-directional antenna
designed to provide the familiar applications from a desktop computer in a mobile format.
Phishing
designed to provide the familiar applications from a desktop computer in a mobile format.
IPSec
designed to provide the familiar applications from a desktop computer in a mobile format.
Chipset
designed to provide the familiar applications from a desktop computer in a mobile format.
SNMP management station
designed to provide the familiar applications from a desktop computer in a mobile format.
Handheld PC
designed to provide the familiar applications from a desktop computer in a mobile format.
Dumpster diving
designed to provide the familiar applications from a desktop computer in a mobile format.
Mini PCI
designed to provide the familiar applications from a desktop computer in a mobile format.
Wireless Zero Configuration (WZC)
integrated operating system tool for a Windows-based computer.
Omni-directional antenna
integrated operating system tool for a Windows-based computer.
Phishing
integrated operating system tool for a Windows-based computer.
IPSec
integrated operating system tool for a Windows-based computer.
Chipset
integrated operating system tool for a Windows-based computer.
SNMP management station
integrated operating system tool for a Windows-based computer.
Handheld PC
integrated operating system tool for a Windows-based computer.
Dumpster diving
integrated operating system tool for a Windows-based computer.
Mini PCI
integrated operating system tool for a Windows-based computer.
Wireless Zero Configuration (WZC)
small card that is functionally equivalent to a standard PCI expansion card.
Omni-directional antenna
small card that is functionally equivalent to a standard PCI expansion card.
Phishing
small card that is functionally equivalent to a standard PCI expansion card.
IPSec
small card that is functionally equivalent to a standard PCI expansion card.
Chipset
small card that is functionally equivalent to a standard PCI expansion card.
SNMP management station
small card that is functionally equivalent to a standard PCI expansion card.
Handheld PC
small card that is functionally equivalent to a standard PCI expansion card.
Dumpster diving
small card that is functionally equivalent to a standard PCI expansion card.
Mini PCI
small card that is functionally equivalent to a standard PCI expansion card.
Wireless Zero Configuration (WZC)
an electronic version of social engineering.
Omni-directional antenna
an electronic version of social engineering.
Phishing
an electronic version of social engineering.
IPSec
an electronic version of social engineering.
Chipset
an electronic version of social engineering.
SNMP management station
an electronic version of social engineering.
Handheld PC
an electronic version of social engineering.
Dumpster diving
an electronic version of social engineering.
Mini PCI
an electronic version of social engineering.
Wireless Zero Configuration (WZC)
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/42
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 3: Passive Wireless Discovery
1
Passive wireless discovery through wardriving is in itself an illegal activity.
False
2
____ relies on tricking and deceiving someone to access a system.

A) Social engineering
B) Wardriving
C) Warchalking
D) Wireless site mapping
A
3
____ is a version of NetStumbler that runs on handheld devices.

A) KisMAC
B) MiniStumbler
C) AiroPeek
D) Kismet
B
4
The informal expression used more often for searching for RF signals is ____.

A) phishing
B) pharming
C) beaconing
D) wardriving
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
5
NetStumbler can capture and decode wireless packets, monitor utilization, or make automatic connections to networks it discovers.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
6
Instead of asking the user to visit a fraudulent Web site, ____ automatically redirects the user to the fake site.

A) spear phishing
B) phishing
C) pharming
D) Google phishing
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
7
____ is a type of solid-state (microchip) technology in which there are no moving parts.

A) Flash memory
B) Sled
C) Mini PCI
D) Type II PC card
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
8
____ is a passive method of receiving WLAN signals.

A) CDMA
B) RFMON
C) SDIO NOW!
D) Sled
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
9
The hardware that allows the mobile computing device to detect a wireless signal is a(n) ____.

A) access point card
B) CompactFlash card
C) flash memory
D) wireless network interface card
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
10
Most phishing sites only function for three to five days to prevent law enforcement agencies from tracking the attackers.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
11
Many of the functions of a PDA are now incorporated into cellular telephones sometimes called ____.

A) smartphones
B) handheld PCs
C) tablet computers
D) slate computers
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
12
____ targets only specific users.

A) Google pharming
B) Spear phishing
C) Pharming
D) Google phishing
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
13
A significant advantage of using PDAs is their ability to synchronize data with another computer.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
14
____ involves sending an e-mail or displaying a Web announcement that falsely claims to be from a legitimate enterprise in an attempt to trick the user into surrendering information.

A) Wardriving
B) Dumpster diving
C) Warchalking
D) Phishing
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
15
____ antennas send a narrowly focused signal beam.

A) Cyclic directional
B) Omni-directional
C) Semi-directional
D) Highly directional
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
16
A(n) ____ PC is small enough to be held in a single hand yet has many of the features of a laptop computer.

A) PCMCIA
B) Tablet
C) handheld
D) slate
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
17
At regular intervals (normally every 100 ms) the wireless access point sends a beacon frame to announce its presence and to provide the necessary information for devices that want to join the network. This process is known as ____.

A) phishing
B) beaconing
C) pharming
D) mapping
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
18
Wardriving software that is specifically designed to pick up a radio frequency WLAN signal is known as a ____.

A) sled
B) client utility
C) freeware discovery application
D) WZC
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
19
A(n) ____ antenna focuses the energy in one direction.

A) cyclic directional
B) omni-directional
C) semi-directional
D) highly directional
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
20
Promiscuous mode will not work on a WLAN.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
21
Known as ____, these attackers lack the technical skills of more advanced users and are sometimes considered more dangerous.

A) hackers
B) script kiddies
C) crackers
D) warchalkers
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
22
What are some of the techniques used by wardrivers to locate RF signals?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
23
What are some of the ways to recognize phishing messages?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
24
____________________ is the formal expression used to refer to the process of finding a WLAN signal and recording information about it.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
25
____ allows computers and network equipment to gather data about network performance.

A) ICMP
B) SMTP
C) FTP
D) SNMP
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
26
The first two versions of SNMP, SNMPv1 and SNMPv2, used ____ that acted like a password to allow or deny access to the information that was collected.

A) community strings
B) management information base (MIB)
C) packet sniffers
D) flash memories
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
27
Wireless networks were identified by drawing on sidewalks or walls around the area of the network known as ____.

A) warchalking
B) phishing
C) pharming
D) dumpster diving
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
28
What are some of the security problems related to improperly recycled equipment?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
29
A wired NIC can be set to ____________________, which turns off the filtering mechanism and allows it to capture all the packets it receives.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
30
Describe two examples of social engineering attacks.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
31
____________________ involves phishers setting up their own search engines to direct traffic to illegitimate sites.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
32
What are some of the options for wireless NICs available for smaller devices like handheld PCs and PDAs?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
33
Each SNMP agent monitors network traffic and stores that information in its ____.

A) community strings
B) packet sniffer
C) management information base (MIB)
D) Type II PC card
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
34
The GPS receiver can deduce its own location based on a mathematical principle called ____________________.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
35
What are the main characteristics of WLAN client utilities?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
36
The smallest mobile computing device is a(n) ____________________.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
37
What are the two fundamental characteristics of antennas?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
38
____, which runs under the Linux operating system, can report similar information as NetStumbler, such as the SSID.

A) Kismet
B) KisMAC
C) WZC
D) GPSMac
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
39
Briefly describe the main characteristics of a tablet computer.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
40
Briefly describe a wireless packet sniffer.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
41
Briefly describe a packet sniffer.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
42
Match between columns
group of integrated circuits that provide the functionality of the wireless NIC.
Omni-directional antenna
group of integrated circuits that provide the functionality of the wireless NIC.
Phishing
group of integrated circuits that provide the functionality of the wireless NIC.
IPSec
group of integrated circuits that provide the functionality of the wireless NIC.
Chipset
group of integrated circuits that provide the functionality of the wireless NIC.
SNMP management station
group of integrated circuits that provide the functionality of the wireless NIC.
Handheld PC
group of integrated circuits that provide the functionality of the wireless NIC.
Dumpster diving
group of integrated circuits that provide the functionality of the wireless NIC.
Mini PCI
group of integrated circuits that provide the functionality of the wireless NIC.
Wireless Zero Configuration (WZC)
communicates with the software agents on each network device and collects the data stored in the MIBs.
Omni-directional antenna
communicates with the software agents on each network device and collects the data stored in the MIBs.
Phishing
communicates with the software agents on each network device and collects the data stored in the MIBs.
IPSec
communicates with the software agents on each network device and collects the data stored in the MIBs.
Chipset
communicates with the software agents on each network device and collects the data stored in the MIBs.
SNMP management station
communicates with the software agents on each network device and collects the data stored in the MIBs.
Handheld PC
communicates with the software agents on each network device and collects the data stored in the MIBs.
Dumpster diving
communicates with the software agents on each network device and collects the data stored in the MIBs.
Mini PCI
communicates with the software agents on each network device and collects the data stored in the MIBs.
Wireless Zero Configuration (WZC)
detects signals from all directions equally.
Omni-directional antenna
detects signals from all directions equally.
Phishing
detects signals from all directions equally.
IPSec
detects signals from all directions equally.
Chipset
detects signals from all directions equally.
SNMP management station
detects signals from all directions equally.
Handheld PC
detects signals from all directions equally.
Dumpster diving
detects signals from all directions equally.
Mini PCI
detects signals from all directions equally.
Wireless Zero Configuration (WZC)
set of protocols developed to support the secure exchange of packets.
Omni-directional antenna
set of protocols developed to support the secure exchange of packets.
Phishing
set of protocols developed to support the secure exchange of packets.
IPSec
set of protocols developed to support the secure exchange of packets.
Chipset
set of protocols developed to support the secure exchange of packets.
SNMP management station
set of protocols developed to support the secure exchange of packets.
Handheld PC
set of protocols developed to support the secure exchange of packets.
Dumpster diving
set of protocols developed to support the secure exchange of packets.
Mini PCI
set of protocols developed to support the secure exchange of packets.
Wireless Zero Configuration (WZC)
looking through large (usually outdoor) trash receptacles.
Omni-directional antenna
looking through large (usually outdoor) trash receptacles.
Phishing
looking through large (usually outdoor) trash receptacles.
IPSec
looking through large (usually outdoor) trash receptacles.
Chipset
looking through large (usually outdoor) trash receptacles.
SNMP management station
looking through large (usually outdoor) trash receptacles.
Handheld PC
looking through large (usually outdoor) trash receptacles.
Dumpster diving
looking through large (usually outdoor) trash receptacles.
Mini PCI
looking through large (usually outdoor) trash receptacles.
Wireless Zero Configuration (WZC)
designed to provide the familiar applications from a desktop computer in a mobile format.
Omni-directional antenna
designed to provide the familiar applications from a desktop computer in a mobile format.
Phishing
designed to provide the familiar applications from a desktop computer in a mobile format.
IPSec
designed to provide the familiar applications from a desktop computer in a mobile format.
Chipset
designed to provide the familiar applications from a desktop computer in a mobile format.
SNMP management station
designed to provide the familiar applications from a desktop computer in a mobile format.
Handheld PC
designed to provide the familiar applications from a desktop computer in a mobile format.
Dumpster diving
designed to provide the familiar applications from a desktop computer in a mobile format.
Mini PCI
designed to provide the familiar applications from a desktop computer in a mobile format.
Wireless Zero Configuration (WZC)
integrated operating system tool for a Windows-based computer.
Omni-directional antenna
integrated operating system tool for a Windows-based computer.
Phishing
integrated operating system tool for a Windows-based computer.
IPSec
integrated operating system tool for a Windows-based computer.
Chipset
integrated operating system tool for a Windows-based computer.
SNMP management station
integrated operating system tool for a Windows-based computer.
Handheld PC
integrated operating system tool for a Windows-based computer.
Dumpster diving
integrated operating system tool for a Windows-based computer.
Mini PCI
integrated operating system tool for a Windows-based computer.
Wireless Zero Configuration (WZC)
small card that is functionally equivalent to a standard PCI expansion card.
Omni-directional antenna
small card that is functionally equivalent to a standard PCI expansion card.
Phishing
small card that is functionally equivalent to a standard PCI expansion card.
IPSec
small card that is functionally equivalent to a standard PCI expansion card.
Chipset
small card that is functionally equivalent to a standard PCI expansion card.
SNMP management station
small card that is functionally equivalent to a standard PCI expansion card.
Handheld PC
small card that is functionally equivalent to a standard PCI expansion card.
Dumpster diving
small card that is functionally equivalent to a standard PCI expansion card.
Mini PCI
small card that is functionally equivalent to a standard PCI expansion card.
Wireless Zero Configuration (WZC)
an electronic version of social engineering.
Omni-directional antenna
an electronic version of social engineering.
Phishing
an electronic version of social engineering.
IPSec
an electronic version of social engineering.
Chipset
an electronic version of social engineering.
SNMP management station
an electronic version of social engineering.
Handheld PC
an electronic version of social engineering.
Dumpster diving
an electronic version of social engineering.
Mini PCI
an electronic version of social engineering.
Wireless Zero Configuration (WZC)
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 42 flashcards in this deck.