Deck 10: Managing the Wireless Network

Full screen (f)
exit full mode
Question
All wireless network interface card adapters can act as a wireless device probe.
Use Space or
up arrow
down arrow
to flip the card.
Question
Global positioning systems (GPS) are widely used in 802.11 WLANs.
Question
A ____ probe is a standard wireless device, such as a portable laptop computer, configured to act as a wireless probe.

A) desktop
B) access point
C) wireless device
D) dedicated
Question
Both SNMP and WLAN management systems contain tools to perform three important management functions: network discovery, ____, and configuration.

A) auditing
B) monitoring
C) logging
D) network association
Question
A spike in a network's bandwidth or a decrease in the time to respond to a request are signs that the network is running slowly. These events are known as a(n) ____.

A) AP trap
B) CDP trap
C) WLAN trap
D) SNMP trap
Question
In a WIPS, signatures, instead of being used for attack detection, are only used to provide additional details about the attack itself.
Question
____ is a diagnostic program that sends a packet to a device and waits for a response to determine if it is properly functioning.

A) MIB
B) SSH
C) SFTP
D) PING
Question
____ allows computers and network equipment to gather data about network performance.

A) SNMP
B) FTP
C) HTTP
D) L2TP
Question
A ____ has been labeled a "cat and mouse" game for trying to find rogue access points.

A) mobile sniffing audit
B) wireless probe
C) triangulation method
D) trilateration method
Question
If SNMP is being used, monitoring often focuses upon the performance of the network.
Question
____ uses intelligent algorithms to improve precision by accounting for the environmental effects on the wireless signal itself.

A) Triangulation
B) Trilateration
C) RSSI
D) RF fingerprinting
Question
The ____ Act covers corporate governance, financial disclosure, and the practice of public accounting.

A) Gramm-Leach-Bliley
B) Health Insurance Portability and Accountability
C) Sarbanes-Oxley
D) CAN-SPAM
Question
Monitoring the RF frequency requires a special sensor called a(n) ____.

A) AP fingerprinter
B) wireless probe
C) wireless triangulator
D) AP trilaterator
Question
____ can be used to measure the RF power loss between transmitter and receiver to calculate the distance from the transmitting device to the receiver.

A) RF fingerprinting
B) RSSI
C) Trilateration
D) Triangulation
Question
The nearest sensor method can locate a client to within a ____ meter area.

A) 600
B) 670
C) 900
D) 930
Question
A ____ constantly monitors the radio frequency (using wireless probes) for attacks.

A) wireless intrusion detection system (WIDS)
B) wireless AP detection system (WADS)
C) rogue AP prevention system (RAPS)
D) rogue AP detection system (RADS)
Question
A(n) ____ WIDS analyzes the information it gathers and compares it to large databases of attack signatures.

A) baseline detection
B) anomaly detection
C) behavior detection
D) signature detection
Question
A(n) ____ integrates several layers of protection to detect and prevent malicious attacks.

A) WLAN concentrator
B) AP concentrator
C) wireless intrusion prevention system (WIPS)
D) RF fingerprinter
Question
The ____ is a signal that tells the strength of the incoming (received) signal.

A) RSSI
B) HTTP
C) MIB
D) RFAP
Question
Wireless network bandwidth is less than that of a wired network.
Question
What is the key to wireless probes?
Question
WIPS detect categories of attacks using predictable or ____ techniques that may involve a combination of different approaches.

A) random
B) deterministic
C) unordered
D) unpredictable
Question
A(n) ____ probe uses dedicated probes for scanning the RF for attacks.

A) integrated
B) embedded
C) internal
D) overlay
Question
In a WIDS anomaly detection system the security administrator defines the ____ (or normal) state of the network's traffic.

A) baseline
B) signature
C) pattern
D) false positives
Question
A(n) ____ probe uses existing access points to monitor the RF.

A) superposed
B) overlay
C) integrated
D) external
Question
Briefly explain the benefits of using SNMP and WLAN management systems to configure APs.
Question
Why was important to monitor a wired network?
Question
A(n) ____ system monitors the normal activity of the wireless LAN and "learns" its normal characteristics.

A) signature detection
B) anomaly detection
C) known attacks detection
D) pattern detection
Question
What are the advantages and disadvantages of using SNMP for WLANs?
Question
How does the nearest sensor method work?
Question
A more proactive approach than intrusion detection is a(n) ____.

A) RF fingerprinting
B) trilateration system
C) RSSI system
D) intrusion prevention system (IPS)
Question
An SNMP ____________________ acknowledges the message with an SNMP response.
Question
Briefly describe how SNMP works.
Question
____________________ measures the angles between three or more nearby APs; where the measurements intersect this can be used to calculate the location of the device.
Question
The ____________________ governs the privacy of personal health information.
Question
A(n) ____________________ is a security management system that compiles information from a computer network or individual computer and then analyzes it to identify security vulnerabilities and attacks.
Question
What are the steps to perform a mobile sniffing audit?
Question
____________________ measures the distance between three or more APs rather than the angles between them.
Question
What is the problem with rogue access points?
Question
What are the disadvantages of using a WIDS?
Question
Compare an intrusion system with a firewall.
Question
Match between columns
most basic method for identifying and locating a rogue access point.
SNMP
most basic method for identifying and locating a rogue access point.
Intrusion prevention system
most basic method for identifying and locating a rogue access point.
Mobile sniffing audit
most basic method for identifying and locating a rogue access point.
Wireless probe
most basic method for identifying and locating a rogue access point.
Dedicated probe
most basic method for identifying and locating a rogue access point.
Gramm-Leach-Bliley Act (GLBA)
most basic method for identifying and locating a rogue access point.
False positives
most basic method for identifying and locating a rogue access point.
Wireless intrusion prevention system (WIPS)
most basic method for identifying and locating a rogue access point.
Nearest sensor
simplest wireless device discovery method.
SNMP
simplest wireless device discovery method.
Intrusion prevention system
simplest wireless device discovery method.
Mobile sniffing audit
simplest wireless device discovery method.
Wireless probe
simplest wireless device discovery method.
Dedicated probe
simplest wireless device discovery method.
Gramm-Leach-Bliley Act (GLBA)
simplest wireless device discovery method.
False positives
simplest wireless device discovery method.
Wireless intrusion prevention system (WIPS)
simplest wireless device discovery method.
Nearest sensor
device that can monitor the airwaves for traffic.
SNMP
device that can monitor the airwaves for traffic.
Intrusion prevention system
device that can monitor the airwaves for traffic.
Mobile sniffing audit
device that can monitor the airwaves for traffic.
Wireless probe
device that can monitor the airwaves for traffic.
Dedicated probe
device that can monitor the airwaves for traffic.
Gramm-Leach-Bliley Act (GLBA)
device that can monitor the airwaves for traffic.
False positives
device that can monitor the airwaves for traffic.
Wireless intrusion prevention system (WIPS)
device that can monitor the airwaves for traffic.
Nearest sensor
attempts to uncover and prevent an attack before it harms the WLAN.
SNMP
attempts to uncover and prevent an attack before it harms the WLAN.
Intrusion prevention system
attempts to uncover and prevent an attack before it harms the WLAN.
Mobile sniffing audit
attempts to uncover and prevent an attack before it harms the WLAN.
Wireless probe
attempts to uncover and prevent an attack before it harms the WLAN.
Dedicated probe
attempts to uncover and prevent an attack before it harms the WLAN.
Gramm-Leach-Bliley Act (GLBA)
attempts to uncover and prevent an attack before it harms the WLAN.
False positives
attempts to uncover and prevent an attack before it harms the WLAN.
Wireless intrusion prevention system (WIPS)
attempts to uncover and prevent an attack before it harms the WLAN.
Nearest sensor
gives limited privacy protections against the sale of private financial information and obtaining personal information through false pretenses.
SNMP
gives limited privacy protections against the sale of private financial information and obtaining personal information through false pretenses.
Intrusion prevention system
gives limited privacy protections against the sale of private financial information and obtaining personal information through false pretenses.
Mobile sniffing audit
gives limited privacy protections against the sale of private financial information and obtaining personal information through false pretenses.
Wireless probe
gives limited privacy protections against the sale of private financial information and obtaining personal information through false pretenses.
Dedicated probe
gives limited privacy protections against the sale of private financial information and obtaining personal information through false pretenses.
Gramm-Leach-Bliley Act (GLBA)
gives limited privacy protections against the sale of private financial information and obtaining personal information through false pretenses.
False positives
gives limited privacy protections against the sale of private financial information and obtaining personal information through false pretenses.
Wireless intrusion prevention system (WIPS)
gives limited privacy protections against the sale of private financial information and obtaining personal information through false pretenses.
Nearest sensor
standard network management protocol for wired networks.
SNMP
standard network management protocol for wired networks.
Intrusion prevention system
standard network management protocol for wired networks.
Mobile sniffing audit
standard network management protocol for wired networks.
Wireless probe
standard network management protocol for wired networks.
Dedicated probe
standard network management protocol for wired networks.
Gramm-Leach-Bliley Act (GLBA)
standard network management protocol for wired networks.
False positives
standard network management protocol for wired networks.
Wireless intrusion prevention system (WIPS)
standard network management protocol for wired networks.
Nearest sensor
designed to exclusively monitor the RF frequency for transmissions.
SNMP
designed to exclusively monitor the RF frequency for transmissions.
Intrusion prevention system
designed to exclusively monitor the RF frequency for transmissions.
Mobile sniffing audit
designed to exclusively monitor the RF frequency for transmissions.
Wireless probe
designed to exclusively monitor the RF frequency for transmissions.
Dedicated probe
designed to exclusively monitor the RF frequency for transmissions.
Gramm-Leach-Bliley Act (GLBA)
designed to exclusively monitor the RF frequency for transmissions.
False positives
designed to exclusively monitor the RF frequency for transmissions.
Wireless intrusion prevention system (WIPS)
designed to exclusively monitor the RF frequency for transmissions.
Nearest sensor
designed to stop an attack from occurring.
SNMP
designed to stop an attack from occurring.
Intrusion prevention system
designed to stop an attack from occurring.
Mobile sniffing audit
designed to stop an attack from occurring.
Wireless probe
designed to stop an attack from occurring.
Dedicated probe
designed to stop an attack from occurring.
Gramm-Leach-Bliley Act (GLBA)
designed to stop an attack from occurring.
False positives
designed to stop an attack from occurring.
Wireless intrusion prevention system (WIPS)
designed to stop an attack from occurring.
Nearest sensor
false attack alerts.
SNMP
false attack alerts.
Intrusion prevention system
false attack alerts.
Mobile sniffing audit
false attack alerts.
Wireless probe
false attack alerts.
Dedicated probe
false attack alerts.
Gramm-Leach-Bliley Act (GLBA)
false attack alerts.
False positives
false attack alerts.
Wireless intrusion prevention system (WIPS)
false attack alerts.
Nearest sensor
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/42
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 10: Managing the Wireless Network
1
All wireless network interface card adapters can act as a wireless device probe.
False
2
Global positioning systems (GPS) are widely used in 802.11 WLANs.
False
3
A ____ probe is a standard wireless device, such as a portable laptop computer, configured to act as a wireless probe.

A) desktop
B) access point
C) wireless device
D) dedicated
C
4
Both SNMP and WLAN management systems contain tools to perform three important management functions: network discovery, ____, and configuration.

A) auditing
B) monitoring
C) logging
D) network association
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
5
A spike in a network's bandwidth or a decrease in the time to respond to a request are signs that the network is running slowly. These events are known as a(n) ____.

A) AP trap
B) CDP trap
C) WLAN trap
D) SNMP trap
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
6
In a WIPS, signatures, instead of being used for attack detection, are only used to provide additional details about the attack itself.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
7
____ is a diagnostic program that sends a packet to a device and waits for a response to determine if it is properly functioning.

A) MIB
B) SSH
C) SFTP
D) PING
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
8
____ allows computers and network equipment to gather data about network performance.

A) SNMP
B) FTP
C) HTTP
D) L2TP
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
9
A ____ has been labeled a "cat and mouse" game for trying to find rogue access points.

A) mobile sniffing audit
B) wireless probe
C) triangulation method
D) trilateration method
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
10
If SNMP is being used, monitoring often focuses upon the performance of the network.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
11
____ uses intelligent algorithms to improve precision by accounting for the environmental effects on the wireless signal itself.

A) Triangulation
B) Trilateration
C) RSSI
D) RF fingerprinting
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
12
The ____ Act covers corporate governance, financial disclosure, and the practice of public accounting.

A) Gramm-Leach-Bliley
B) Health Insurance Portability and Accountability
C) Sarbanes-Oxley
D) CAN-SPAM
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
13
Monitoring the RF frequency requires a special sensor called a(n) ____.

A) AP fingerprinter
B) wireless probe
C) wireless triangulator
D) AP trilaterator
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
14
____ can be used to measure the RF power loss between transmitter and receiver to calculate the distance from the transmitting device to the receiver.

A) RF fingerprinting
B) RSSI
C) Trilateration
D) Triangulation
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
15
The nearest sensor method can locate a client to within a ____ meter area.

A) 600
B) 670
C) 900
D) 930
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
16
A ____ constantly monitors the radio frequency (using wireless probes) for attacks.

A) wireless intrusion detection system (WIDS)
B) wireless AP detection system (WADS)
C) rogue AP prevention system (RAPS)
D) rogue AP detection system (RADS)
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
17
A(n) ____ WIDS analyzes the information it gathers and compares it to large databases of attack signatures.

A) baseline detection
B) anomaly detection
C) behavior detection
D) signature detection
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
18
A(n) ____ integrates several layers of protection to detect and prevent malicious attacks.

A) WLAN concentrator
B) AP concentrator
C) wireless intrusion prevention system (WIPS)
D) RF fingerprinter
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
19
The ____ is a signal that tells the strength of the incoming (received) signal.

A) RSSI
B) HTTP
C) MIB
D) RFAP
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
20
Wireless network bandwidth is less than that of a wired network.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
21
What is the key to wireless probes?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
22
WIPS detect categories of attacks using predictable or ____ techniques that may involve a combination of different approaches.

A) random
B) deterministic
C) unordered
D) unpredictable
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
23
A(n) ____ probe uses dedicated probes for scanning the RF for attacks.

A) integrated
B) embedded
C) internal
D) overlay
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
24
In a WIDS anomaly detection system the security administrator defines the ____ (or normal) state of the network's traffic.

A) baseline
B) signature
C) pattern
D) false positives
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
25
A(n) ____ probe uses existing access points to monitor the RF.

A) superposed
B) overlay
C) integrated
D) external
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
26
Briefly explain the benefits of using SNMP and WLAN management systems to configure APs.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
27
Why was important to monitor a wired network?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
28
A(n) ____ system monitors the normal activity of the wireless LAN and "learns" its normal characteristics.

A) signature detection
B) anomaly detection
C) known attacks detection
D) pattern detection
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
29
What are the advantages and disadvantages of using SNMP for WLANs?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
30
How does the nearest sensor method work?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
31
A more proactive approach than intrusion detection is a(n) ____.

A) RF fingerprinting
B) trilateration system
C) RSSI system
D) intrusion prevention system (IPS)
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
32
An SNMP ____________________ acknowledges the message with an SNMP response.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
33
Briefly describe how SNMP works.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
34
____________________ measures the angles between three or more nearby APs; where the measurements intersect this can be used to calculate the location of the device.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
35
The ____________________ governs the privacy of personal health information.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
36
A(n) ____________________ is a security management system that compiles information from a computer network or individual computer and then analyzes it to identify security vulnerabilities and attacks.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
37
What are the steps to perform a mobile sniffing audit?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
38
____________________ measures the distance between three or more APs rather than the angles between them.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
39
What is the problem with rogue access points?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
40
What are the disadvantages of using a WIDS?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
41
Compare an intrusion system with a firewall.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
42
Match between columns
most basic method for identifying and locating a rogue access point.
SNMP
most basic method for identifying and locating a rogue access point.
Intrusion prevention system
most basic method for identifying and locating a rogue access point.
Mobile sniffing audit
most basic method for identifying and locating a rogue access point.
Wireless probe
most basic method for identifying and locating a rogue access point.
Dedicated probe
most basic method for identifying and locating a rogue access point.
Gramm-Leach-Bliley Act (GLBA)
most basic method for identifying and locating a rogue access point.
False positives
most basic method for identifying and locating a rogue access point.
Wireless intrusion prevention system (WIPS)
most basic method for identifying and locating a rogue access point.
Nearest sensor
simplest wireless device discovery method.
SNMP
simplest wireless device discovery method.
Intrusion prevention system
simplest wireless device discovery method.
Mobile sniffing audit
simplest wireless device discovery method.
Wireless probe
simplest wireless device discovery method.
Dedicated probe
simplest wireless device discovery method.
Gramm-Leach-Bliley Act (GLBA)
simplest wireless device discovery method.
False positives
simplest wireless device discovery method.
Wireless intrusion prevention system (WIPS)
simplest wireless device discovery method.
Nearest sensor
device that can monitor the airwaves for traffic.
SNMP
device that can monitor the airwaves for traffic.
Intrusion prevention system
device that can monitor the airwaves for traffic.
Mobile sniffing audit
device that can monitor the airwaves for traffic.
Wireless probe
device that can monitor the airwaves for traffic.
Dedicated probe
device that can monitor the airwaves for traffic.
Gramm-Leach-Bliley Act (GLBA)
device that can monitor the airwaves for traffic.
False positives
device that can monitor the airwaves for traffic.
Wireless intrusion prevention system (WIPS)
device that can monitor the airwaves for traffic.
Nearest sensor
attempts to uncover and prevent an attack before it harms the WLAN.
SNMP
attempts to uncover and prevent an attack before it harms the WLAN.
Intrusion prevention system
attempts to uncover and prevent an attack before it harms the WLAN.
Mobile sniffing audit
attempts to uncover and prevent an attack before it harms the WLAN.
Wireless probe
attempts to uncover and prevent an attack before it harms the WLAN.
Dedicated probe
attempts to uncover and prevent an attack before it harms the WLAN.
Gramm-Leach-Bliley Act (GLBA)
attempts to uncover and prevent an attack before it harms the WLAN.
False positives
attempts to uncover and prevent an attack before it harms the WLAN.
Wireless intrusion prevention system (WIPS)
attempts to uncover and prevent an attack before it harms the WLAN.
Nearest sensor
gives limited privacy protections against the sale of private financial information and obtaining personal information through false pretenses.
SNMP
gives limited privacy protections against the sale of private financial information and obtaining personal information through false pretenses.
Intrusion prevention system
gives limited privacy protections against the sale of private financial information and obtaining personal information through false pretenses.
Mobile sniffing audit
gives limited privacy protections against the sale of private financial information and obtaining personal information through false pretenses.
Wireless probe
gives limited privacy protections against the sale of private financial information and obtaining personal information through false pretenses.
Dedicated probe
gives limited privacy protections against the sale of private financial information and obtaining personal information through false pretenses.
Gramm-Leach-Bliley Act (GLBA)
gives limited privacy protections against the sale of private financial information and obtaining personal information through false pretenses.
False positives
gives limited privacy protections against the sale of private financial information and obtaining personal information through false pretenses.
Wireless intrusion prevention system (WIPS)
gives limited privacy protections against the sale of private financial information and obtaining personal information through false pretenses.
Nearest sensor
standard network management protocol for wired networks.
SNMP
standard network management protocol for wired networks.
Intrusion prevention system
standard network management protocol for wired networks.
Mobile sniffing audit
standard network management protocol for wired networks.
Wireless probe
standard network management protocol for wired networks.
Dedicated probe
standard network management protocol for wired networks.
Gramm-Leach-Bliley Act (GLBA)
standard network management protocol for wired networks.
False positives
standard network management protocol for wired networks.
Wireless intrusion prevention system (WIPS)
standard network management protocol for wired networks.
Nearest sensor
designed to exclusively monitor the RF frequency for transmissions.
SNMP
designed to exclusively monitor the RF frequency for transmissions.
Intrusion prevention system
designed to exclusively monitor the RF frequency for transmissions.
Mobile sniffing audit
designed to exclusively monitor the RF frequency for transmissions.
Wireless probe
designed to exclusively monitor the RF frequency for transmissions.
Dedicated probe
designed to exclusively monitor the RF frequency for transmissions.
Gramm-Leach-Bliley Act (GLBA)
designed to exclusively monitor the RF frequency for transmissions.
False positives
designed to exclusively monitor the RF frequency for transmissions.
Wireless intrusion prevention system (WIPS)
designed to exclusively monitor the RF frequency for transmissions.
Nearest sensor
designed to stop an attack from occurring.
SNMP
designed to stop an attack from occurring.
Intrusion prevention system
designed to stop an attack from occurring.
Mobile sniffing audit
designed to stop an attack from occurring.
Wireless probe
designed to stop an attack from occurring.
Dedicated probe
designed to stop an attack from occurring.
Gramm-Leach-Bliley Act (GLBA)
designed to stop an attack from occurring.
False positives
designed to stop an attack from occurring.
Wireless intrusion prevention system (WIPS)
designed to stop an attack from occurring.
Nearest sensor
false attack alerts.
SNMP
false attack alerts.
Intrusion prevention system
false attack alerts.
Mobile sniffing audit
false attack alerts.
Wireless probe
false attack alerts.
Dedicated probe
false attack alerts.
Gramm-Leach-Bliley Act (GLBA)
false attack alerts.
False positives
false attack alerts.
Wireless intrusion prevention system (WIPS)
false attack alerts.
Nearest sensor
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 42 flashcards in this deck.