Deck 4: Active Wireless Attacks

Full screen (f)
exit full mode
Question
An incorrect configuration of wireless hardware or software can often result in easy access to a system.
Use Space or
up arrow
down arrow
to flip the card.
Question
____ occurs when an individual uses the personal information of someone else to impersonate that individual with the intent to commit fraud or other crimes.

A) Identity theft
B) Spam
C) DoS attack
D) Phishing
Question
DoS attacks are rare against wired network servers.
Question
Before users can be given access to a computer and its data, they must in some way prove that they are who they claim to be. This process of providing proof is known as ____.

A) authorization
B) encryption
C) cryptography
D) authentication
Question
In a ____ attack, each word from a dictionary is encoded in the same way the computer encodes a user's password for protection. Attackers then compare the encoded dictionary words against those in the encoded password file.

A) DoS
B) brute force
C) dictionary
D) rogue AP
Question
Authentication can be performed based on what you have, what you know, or what you are.
Question
The ____ is a popular protocol used to manage networked equipment.

A) SMTP
B) SNMP
C) FTP
D) POP3
Question
____ is a service that allows devices on a network to discover other devices and determine how to work with them.

A) IPSec
B) SNMP
C) UPnP
D) PnP
Question
____ typically displays advertising banners or pop-up ads and is frequently encountered while visiting Web sites with a browser.

A) Logic bomb
B) Adware
C) Spam
D) Phishing
Question
____ is a general term used to describe software that violates a user's personal security.

A) Virus
B) Spyware
C) Worm
D) Logic bomb
Question
A computer ____ is a program that secretly attaches itself to another document or program and executes when that document or program is opened.

A) virus
B) worm
C) spam
D) logic bomb
Question
In a ____ attack, an attacker attempts to create every possible password combination by systematically changing one character at a time in a password.

A) dictionary
B) brute force
C) DoS
D) rogue AP
Question
A ____ bypasses all of the network security and opens the entire network and all users to direct attacks.

A) wireless router
B) firewall
C) rogue access point
D) wireless gateway
Question
A ____ attack is designed to prevent a device from performing its intended function.

A) denial-of-service (DoS)
B) rogue AP
C) phishing
D) pharming
Question
A ____ is a computer program that lies dormant until it is triggered by a specific event.

A) worm
B) virus
C) spam
D) logic bomb
Question
In technical terms, ____ describes the points of risk regarding the penetration of a security defense.

A) security vulnerability
B) dictionary attack
C) password guessing
D) IPSec
Question
Because CSMA/CA has all stations wait a random amount of time after the medium is clear, the number of collisions is significantly reduced.
Question
____ allows the Windows operating system to automatically detect new hardware when it is installed on a computer.

A) UPnP
B) SNMP
C) IPSec
D) PnP
Question
One of the spyware tools often used is ____.

A) DoS
B) spam
C) adware
D) rogue APs
Question
Logic bombs are easy to detect before they are triggered.
Question
The Anti-Spyware Coalition defines ____________________ as technologies that are implemented in ways that impair a user's control over the use of system resources.
Question
With wireless CSMA/CA the amount of time that a device must wait after the medium is clear is called the ____________________.
Question
A(n) ____________________ may be defined as a weakness or flaw in an information system that could be exploited to cause harm.
Question
Most successful wireless DoS attacks are performed at the ____ layer of the OSI model.

A) Physical
B) MAC
C) Network
D) Application
Question
What are the minimum criteria for creating good passwords?
Question
What are the problems with using default passwords?
Question
Because the wireless medium is shared among all devices, there must be rules for cooperation among the wireless devices. The 802.11 standard uses a procedure known as ____.

A) ISM
B) CSMA/CD
C) CSMA/CA
D) IPSec
Question
What are some of the characteristics of weak passwords?
Question
What are some of the symptoms that indicate a virus has infected a computer?
Question
A ____ program creates fake packets and flood the wireless network.

A) MAC
B) packet sniffer
C) packet generator
D) CSMA/CA
Question
____ attacks are designed to deny wireless devices access to the access point itself.

A) DoS
B) Phishing
C) Rogue AP
D) Wireless DoS
Question
With explicit ____, an acknowledgment frame (abbreviated ACK) is sent by the receiving device back to the sending device to confirm that the data frame arrived intact.

A) packet generator
B) slot time
C) CRC
D) frame acknowledgment
Question
What are the security problems related to supporting remote access in wireless gateways?
Question
What are the security problems related to adware?
Question
____________________ are devices that combine access point, router, and network address translation features.
Question
____ attacks flood the RF spectrum with enough radiomagnetic interference to prevent a device from effectively communicating with the AP.

A) Physical layer
B) MAC layer
C) LLC layer
D) Transport layer
Question
Once an attacker's wireless device has entered the network and focused its attacks at other similar devices this is known as a(n) ____________________.
Question
Briefly explain the password paradox.
Question
What are the problems of using community strings in SNMP?
Question
Briefly describe the Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) procedure.
Question
Briefly describe how to perform a wired network DoS attack.
Question
Match between columns
determines the number of unique new passwords a user must use before an old password can be reused.
Spam
determines the number of unique new passwords a user must use before an old password can be reused.
CAN-SPAM
determines the number of unique new passwords a user must use before an old password can be reused.
Adware
determines the number of unique new passwords a user must use before an old password can be reused.
Password
determines the number of unique new passwords a user must use before an old password can be reused.
Malware
determines the number of unique new passwords a user must use before an old password can be reused.
Minimum password age
determines the number of unique new passwords a user must use before an old password can be reused.
Password history
determines the number of unique new passwords a user must use before an old password can be reused.
Maximum password age
determines the number of unique new passwords a user must use before an old password can be reused.
CSMA/CA
a secret combination of letters and numbers that serves to validate or authenticate a user by what he knows.
Spam
a secret combination of letters and numbers that serves to validate or authenticate a user by what he knows.
CAN-SPAM
a secret combination of letters and numbers that serves to validate or authenticate a user by what he knows.
Adware
a secret combination of letters and numbers that serves to validate or authenticate a user by what he knows.
Password
a secret combination of letters and numbers that serves to validate or authenticate a user by what he knows.
Malware
a secret combination of letters and numbers that serves to validate or authenticate a user by what he knows.
Minimum password age
a secret combination of letters and numbers that serves to validate or authenticate a user by what he knows.
Password history
a secret combination of letters and numbers that serves to validate or authenticate a user by what he knows.
Maximum password age
a secret combination of letters and numbers that serves to validate or authenticate a user by what he knows.
CSMA/CA
unsolicited e-mail.
Spam
unsolicited e-mail.
CAN-SPAM
unsolicited e-mail.
Adware
unsolicited e-mail.
Password
unsolicited e-mail.
Malware
unsolicited e-mail.
Minimum password age
unsolicited e-mail.
Password history
unsolicited e-mail.
Maximum password age
unsolicited e-mail.
CSMA/CA
term used to describe computer programs designed to break into and create havoc on portable or desktop computers.
Spam
term used to describe computer programs designed to break into and create havoc on portable or desktop computers.
CAN-SPAM
term used to describe computer programs designed to break into and create havoc on portable or desktop computers.
Adware
term used to describe computer programs designed to break into and create havoc on portable or desktop computers.
Password
term used to describe computer programs designed to break into and create havoc on portable or desktop computers.
Malware
term used to describe computer programs designed to break into and create havoc on portable or desktop computers.
Minimum password age
term used to describe computer programs designed to break into and create havoc on portable or desktop computers.
Password history
term used to describe computer programs designed to break into and create havoc on portable or desktop computers.
Maximum password age
term used to describe computer programs designed to break into and create havoc on portable or desktop computers.
CSMA/CA
attempts to prevent multiple wireless devices from transmitting at the same time.
Spam
attempts to prevent multiple wireless devices from transmitting at the same time.
CAN-SPAM
attempts to prevent multiple wireless devices from transmitting at the same time.
Adware
attempts to prevent multiple wireless devices from transmitting at the same time.
Password
attempts to prevent multiple wireless devices from transmitting at the same time.
Malware
attempts to prevent multiple wireless devices from transmitting at the same time.
Minimum password age
attempts to prevent multiple wireless devices from transmitting at the same time.
Password history
attempts to prevent multiple wireless devices from transmitting at the same time.
Maximum password age
attempts to prevent multiple wireless devices from transmitting at the same time.
CSMA/CA
how many days a password can be used before the user is required to change it.
Spam
how many days a password can be used before the user is required to change it.
CAN-SPAM
how many days a password can be used before the user is required to change it.
Adware
how many days a password can be used before the user is required to change it.
Password
how many days a password can be used before the user is required to change it.
Malware
how many days a password can be used before the user is required to change it.
Minimum password age
how many days a password can be used before the user is required to change it.
Password history
how many days a password can be used before the user is required to change it.
Maximum password age
how many days a password can be used before the user is required to change it.
CSMA/CA
U.S. law against spam.
Spam
U.S. law against spam.
CAN-SPAM
U.S. law against spam.
Adware
U.S. law against spam.
Password
U.S. law against spam.
Malware
U.S. law against spam.
Minimum password age
U.S. law against spam.
Password history
U.S. law against spam.
Maximum password age
U.S. law against spam.
CSMA/CA
determines how many days a user must keep new passwords before they can change them.
Spam
determines how many days a user must keep new passwords before they can change them.
CAN-SPAM
determines how many days a user must keep new passwords before they can change them.
Adware
determines how many days a user must keep new passwords before they can change them.
Password
determines how many days a user must keep new passwords before they can change them.
Malware
determines how many days a user must keep new passwords before they can change them.
Minimum password age
determines how many days a user must keep new passwords before they can change them.
Password history
determines how many days a user must keep new passwords before they can change them.
Maximum password age
determines how many days a user must keep new passwords before they can change them.
CSMA/CA
software that delivers advertising content in a manner or context that is unexpected and unwanted by the user.
Spam
software that delivers advertising content in a manner or context that is unexpected and unwanted by the user.
CAN-SPAM
software that delivers advertising content in a manner or context that is unexpected and unwanted by the user.
Adware
software that delivers advertising content in a manner or context that is unexpected and unwanted by the user.
Password
software that delivers advertising content in a manner or context that is unexpected and unwanted by the user.
Malware
software that delivers advertising content in a manner or context that is unexpected and unwanted by the user.
Minimum password age
software that delivers advertising content in a manner or context that is unexpected and unwanted by the user.
Password history
software that delivers advertising content in a manner or context that is unexpected and unwanted by the user.
Maximum password age
software that delivers advertising content in a manner or context that is unexpected and unwanted by the user.
CSMA/CA
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/42
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 4: Active Wireless Attacks
1
An incorrect configuration of wireless hardware or software can often result in easy access to a system.
True
2
____ occurs when an individual uses the personal information of someone else to impersonate that individual with the intent to commit fraud or other crimes.

A) Identity theft
B) Spam
C) DoS attack
D) Phishing
A
3
DoS attacks are rare against wired network servers.
False
4
Before users can be given access to a computer and its data, they must in some way prove that they are who they claim to be. This process of providing proof is known as ____.

A) authorization
B) encryption
C) cryptography
D) authentication
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
5
In a ____ attack, each word from a dictionary is encoded in the same way the computer encodes a user's password for protection. Attackers then compare the encoded dictionary words against those in the encoded password file.

A) DoS
B) brute force
C) dictionary
D) rogue AP
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
6
Authentication can be performed based on what you have, what you know, or what you are.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
7
The ____ is a popular protocol used to manage networked equipment.

A) SMTP
B) SNMP
C) FTP
D) POP3
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
8
____ is a service that allows devices on a network to discover other devices and determine how to work with them.

A) IPSec
B) SNMP
C) UPnP
D) PnP
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
9
____ typically displays advertising banners or pop-up ads and is frequently encountered while visiting Web sites with a browser.

A) Logic bomb
B) Adware
C) Spam
D) Phishing
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
10
____ is a general term used to describe software that violates a user's personal security.

A) Virus
B) Spyware
C) Worm
D) Logic bomb
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
11
A computer ____ is a program that secretly attaches itself to another document or program and executes when that document or program is opened.

A) virus
B) worm
C) spam
D) logic bomb
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
12
In a ____ attack, an attacker attempts to create every possible password combination by systematically changing one character at a time in a password.

A) dictionary
B) brute force
C) DoS
D) rogue AP
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
13
A ____ bypasses all of the network security and opens the entire network and all users to direct attacks.

A) wireless router
B) firewall
C) rogue access point
D) wireless gateway
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
14
A ____ attack is designed to prevent a device from performing its intended function.

A) denial-of-service (DoS)
B) rogue AP
C) phishing
D) pharming
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
15
A ____ is a computer program that lies dormant until it is triggered by a specific event.

A) worm
B) virus
C) spam
D) logic bomb
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
16
In technical terms, ____ describes the points of risk regarding the penetration of a security defense.

A) security vulnerability
B) dictionary attack
C) password guessing
D) IPSec
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
17
Because CSMA/CA has all stations wait a random amount of time after the medium is clear, the number of collisions is significantly reduced.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
18
____ allows the Windows operating system to automatically detect new hardware when it is installed on a computer.

A) UPnP
B) SNMP
C) IPSec
D) PnP
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
19
One of the spyware tools often used is ____.

A) DoS
B) spam
C) adware
D) rogue APs
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
20
Logic bombs are easy to detect before they are triggered.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
21
The Anti-Spyware Coalition defines ____________________ as technologies that are implemented in ways that impair a user's control over the use of system resources.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
22
With wireless CSMA/CA the amount of time that a device must wait after the medium is clear is called the ____________________.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
23
A(n) ____________________ may be defined as a weakness or flaw in an information system that could be exploited to cause harm.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
24
Most successful wireless DoS attacks are performed at the ____ layer of the OSI model.

A) Physical
B) MAC
C) Network
D) Application
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
25
What are the minimum criteria for creating good passwords?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
26
What are the problems with using default passwords?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
27
Because the wireless medium is shared among all devices, there must be rules for cooperation among the wireless devices. The 802.11 standard uses a procedure known as ____.

A) ISM
B) CSMA/CD
C) CSMA/CA
D) IPSec
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
28
What are some of the characteristics of weak passwords?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
29
What are some of the symptoms that indicate a virus has infected a computer?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
30
A ____ program creates fake packets and flood the wireless network.

A) MAC
B) packet sniffer
C) packet generator
D) CSMA/CA
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
31
____ attacks are designed to deny wireless devices access to the access point itself.

A) DoS
B) Phishing
C) Rogue AP
D) Wireless DoS
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
32
With explicit ____, an acknowledgment frame (abbreviated ACK) is sent by the receiving device back to the sending device to confirm that the data frame arrived intact.

A) packet generator
B) slot time
C) CRC
D) frame acknowledgment
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
33
What are the security problems related to supporting remote access in wireless gateways?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
34
What are the security problems related to adware?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
35
____________________ are devices that combine access point, router, and network address translation features.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
36
____ attacks flood the RF spectrum with enough radiomagnetic interference to prevent a device from effectively communicating with the AP.

A) Physical layer
B) MAC layer
C) LLC layer
D) Transport layer
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
37
Once an attacker's wireless device has entered the network and focused its attacks at other similar devices this is known as a(n) ____________________.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
38
Briefly explain the password paradox.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
39
What are the problems of using community strings in SNMP?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
40
Briefly describe the Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) procedure.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
41
Briefly describe how to perform a wired network DoS attack.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
42
Match between columns
determines the number of unique new passwords a user must use before an old password can be reused.
Spam
determines the number of unique new passwords a user must use before an old password can be reused.
CAN-SPAM
determines the number of unique new passwords a user must use before an old password can be reused.
Adware
determines the number of unique new passwords a user must use before an old password can be reused.
Password
determines the number of unique new passwords a user must use before an old password can be reused.
Malware
determines the number of unique new passwords a user must use before an old password can be reused.
Minimum password age
determines the number of unique new passwords a user must use before an old password can be reused.
Password history
determines the number of unique new passwords a user must use before an old password can be reused.
Maximum password age
determines the number of unique new passwords a user must use before an old password can be reused.
CSMA/CA
a secret combination of letters and numbers that serves to validate or authenticate a user by what he knows.
Spam
a secret combination of letters and numbers that serves to validate or authenticate a user by what he knows.
CAN-SPAM
a secret combination of letters and numbers that serves to validate or authenticate a user by what he knows.
Adware
a secret combination of letters and numbers that serves to validate or authenticate a user by what he knows.
Password
a secret combination of letters and numbers that serves to validate or authenticate a user by what he knows.
Malware
a secret combination of letters and numbers that serves to validate or authenticate a user by what he knows.
Minimum password age
a secret combination of letters and numbers that serves to validate or authenticate a user by what he knows.
Password history
a secret combination of letters and numbers that serves to validate or authenticate a user by what he knows.
Maximum password age
a secret combination of letters and numbers that serves to validate or authenticate a user by what he knows.
CSMA/CA
unsolicited e-mail.
Spam
unsolicited e-mail.
CAN-SPAM
unsolicited e-mail.
Adware
unsolicited e-mail.
Password
unsolicited e-mail.
Malware
unsolicited e-mail.
Minimum password age
unsolicited e-mail.
Password history
unsolicited e-mail.
Maximum password age
unsolicited e-mail.
CSMA/CA
term used to describe computer programs designed to break into and create havoc on portable or desktop computers.
Spam
term used to describe computer programs designed to break into and create havoc on portable or desktop computers.
CAN-SPAM
term used to describe computer programs designed to break into and create havoc on portable or desktop computers.
Adware
term used to describe computer programs designed to break into and create havoc on portable or desktop computers.
Password
term used to describe computer programs designed to break into and create havoc on portable or desktop computers.
Malware
term used to describe computer programs designed to break into and create havoc on portable or desktop computers.
Minimum password age
term used to describe computer programs designed to break into and create havoc on portable or desktop computers.
Password history
term used to describe computer programs designed to break into and create havoc on portable or desktop computers.
Maximum password age
term used to describe computer programs designed to break into and create havoc on portable or desktop computers.
CSMA/CA
attempts to prevent multiple wireless devices from transmitting at the same time.
Spam
attempts to prevent multiple wireless devices from transmitting at the same time.
CAN-SPAM
attempts to prevent multiple wireless devices from transmitting at the same time.
Adware
attempts to prevent multiple wireless devices from transmitting at the same time.
Password
attempts to prevent multiple wireless devices from transmitting at the same time.
Malware
attempts to prevent multiple wireless devices from transmitting at the same time.
Minimum password age
attempts to prevent multiple wireless devices from transmitting at the same time.
Password history
attempts to prevent multiple wireless devices from transmitting at the same time.
Maximum password age
attempts to prevent multiple wireless devices from transmitting at the same time.
CSMA/CA
how many days a password can be used before the user is required to change it.
Spam
how many days a password can be used before the user is required to change it.
CAN-SPAM
how many days a password can be used before the user is required to change it.
Adware
how many days a password can be used before the user is required to change it.
Password
how many days a password can be used before the user is required to change it.
Malware
how many days a password can be used before the user is required to change it.
Minimum password age
how many days a password can be used before the user is required to change it.
Password history
how many days a password can be used before the user is required to change it.
Maximum password age
how many days a password can be used before the user is required to change it.
CSMA/CA
U.S. law against spam.
Spam
U.S. law against spam.
CAN-SPAM
U.S. law against spam.
Adware
U.S. law against spam.
Password
U.S. law against spam.
Malware
U.S. law against spam.
Minimum password age
U.S. law against spam.
Password history
U.S. law against spam.
Maximum password age
U.S. law against spam.
CSMA/CA
determines how many days a user must keep new passwords before they can change them.
Spam
determines how many days a user must keep new passwords before they can change them.
CAN-SPAM
determines how many days a user must keep new passwords before they can change them.
Adware
determines how many days a user must keep new passwords before they can change them.
Password
determines how many days a user must keep new passwords before they can change them.
Malware
determines how many days a user must keep new passwords before they can change them.
Minimum password age
determines how many days a user must keep new passwords before they can change them.
Password history
determines how many days a user must keep new passwords before they can change them.
Maximum password age
determines how many days a user must keep new passwords before they can change them.
CSMA/CA
software that delivers advertising content in a manner or context that is unexpected and unwanted by the user.
Spam
software that delivers advertising content in a manner or context that is unexpected and unwanted by the user.
CAN-SPAM
software that delivers advertising content in a manner or context that is unexpected and unwanted by the user.
Adware
software that delivers advertising content in a manner or context that is unexpected and unwanted by the user.
Password
software that delivers advertising content in a manner or context that is unexpected and unwanted by the user.
Malware
software that delivers advertising content in a manner or context that is unexpected and unwanted by the user.
Minimum password age
software that delivers advertising content in a manner or context that is unexpected and unwanted by the user.
Password history
software that delivers advertising content in a manner or context that is unexpected and unwanted by the user.
Maximum password age
software that delivers advertising content in a manner or context that is unexpected and unwanted by the user.
CSMA/CA
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 42 flashcards in this deck.